Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-07-2024 09:54

General

  • Target

    4551086e4135b3022b23888ca54d8821_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    4551086e4135b3022b23888ca54d8821

  • SHA1

    24e9b590ff93272d8ad1755e11b796049a33d592

  • SHA256

    6902aa11704fa7b5f01efc6a86e10825ef27b73984b450097c513a8d65df2b0c

  • SHA512

    bc71b787c1e49a8d82bc483e8bd9b69ba3754b372c9e20a19a7ba77aa10f4d560edd672a1f43f3d94bec6114505f56b448248954075209e756cbda7409088c1d

  • SSDEEP

    3072:1pXT6Dqiz7fZTLMilrJhZyKfqhKzbCZvKzvQR/2hNY4UW:15T6DvlLJZXyhJKzjhJUW

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3392
      • C:\Users\Admin\AppData\Local\Temp\4551086e4135b3022b23888ca54d8821_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4551086e4135b3022b23888ca54d8821_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Users\Admin\AppData\Local\Temp\4551086e4135b3022b23888ca54d8821_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\4551086e4135b3022b23888ca54d8821_JaffaCakes118.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1948-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1948-7-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1948-6-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    • memory/1948-5-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1948-15-0x0000000000410000-0x00000000004D9000-memory.dmp

      Filesize

      804KB

    • memory/2096-0-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2096-9-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3392-11-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3392-12-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB