Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 15:55

General

  • Target

    4a5d9811cadb4fed344a2bd325677f67_JaffaCakes118.exe

  • Size

    71KB

  • MD5

    4a5d9811cadb4fed344a2bd325677f67

  • SHA1

    fdf4975c05dd253d40ab80da7a40223e82930dc8

  • SHA256

    405f17242898506dac7e8a1d8814285cb1feb90f9548b029e1802406b413c0c5

  • SHA512

    b167d345cfe1d4dc355731a0cf885c0e37e412af2df80a157dc9a668a5f8b23be3f799cf7b76e7c1cd27b6fd0983cc757506600f55dd1476fec91d7e12696f14

  • SSDEEP

    768:SbcgPazojQaIHjpe9tyaxP1zwtg+apkqDoY0geHcweMJuXMekE:78azuqHjp0tyi/fVeHeltD

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a5d9811cadb4fed344a2bd325677f67_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4a5d9811cadb4fed344a2bd325677f67_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-1-0x0000000000401000-0x000000000040D000-memory.dmp

    Filesize

    48KB

  • memory/1512-3-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB