Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 00:14

General

  • Target

    4764d121e4247d271cf5c2e2b5653e42_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    4764d121e4247d271cf5c2e2b5653e42

  • SHA1

    6c362969774aef93c5383e6020937d8cc45ee3c5

  • SHA256

    f37b6cdd0bd627bc40b8fd65fe8f9bcafdf6d49adffea8e72cebf8457717efcd

  • SHA512

    753b303b76d700f78a0d02800fb9423de609aa8ea084a81ea25e71c44207ac41f43346c9a0630a2090f1fa20e3ef2ddee2f560921f3b3147194cf8252d01a145

  • SSDEEP

    384:qgblACY0Tc6r2HmwaCGvgK00A7pkVLr2gBlN6NaLAEaRXMYQm/fL3DXpou:Jb17/2wtA7pk528lNOrEaR8YhLzb

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4764d121e4247d271cf5c2e2b5653e42_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4764d121e4247d271cf5c2e2b5653e42_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:4636

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Internet Explorer\IEXPLORE.win

          Filesize

          28KB

          MD5

          52cc82e23ae528d34c4c2032d40ac756

          SHA1

          749986124aa0caf2228b5d543b4f9054f2e31880

          SHA256

          7c6275d2fdc073213efa43cbfe1c7e413a763a1914dcc4aef9e3005ba92063a3

          SHA512

          29bcca91e7327e5b276713e9f670b645190012c6db0d0bdfd4703f7ce471c37e92721aed413ebdbbfda3ce438a42b095b2bab15fd56f3acd5c2fd3e943a99bab

        • memory/4636-0-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/4636-7-0x00000000008A0000-0x00000000008AD000-memory.dmp

          Filesize

          52KB

        • memory/4636-11-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/4636-12-0x00000000008A0000-0x00000000008AD000-memory.dmp

          Filesize

          52KB

        • memory/4636-36-0x00000000008A0000-0x00000000008AD000-memory.dmp

          Filesize

          52KB