Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 01:08

General

  • Target

    59d928d25c2a538026a884a10b2f5550_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    59d928d25c2a538026a884a10b2f5550

  • SHA1

    065c65f8ca328d18ddaf34ac91658836d5bc5c38

  • SHA256

    e8d77346b648708fdce08f10f2cce1edeacc07f19f4ab6291278547d3824b1d7

  • SHA512

    5cbc485a0a9684aae16417fbd4cf85ba30524a161690b771c91c9f336d865142f0af38367d98a05140bb45478e5cac7317038160a0fb8fed66f8f2abb2798b62

  • SSDEEP

    384:2E+elGqMa71szUy03ytothYs6t/4zYO1YHS3IABalJHteu0eqcMphLwTX8fZAnKi:V+e4qZ71szU7L86TOy3I1PyPhMT8RAnf

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59d928d25c2a538026a884a10b2f5550_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\59d928d25c2a538026a884a10b2f5550_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\59d928d25c2a538026a884a10b2f5550_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\59d928d25c2a538026a884a10b2f5550_JaffaCakes118.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 36
        3⤵
        • Program crash
        PID:2688

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2760-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2760-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2760-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2760-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2772-5-0x0000000010000000-0x000000001000E000-memory.dmp

    Filesize

    56KB