Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 02:39

General

  • Target

    5a20f32c420c7d05f349a21a1d9572fa_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    5a20f32c420c7d05f349a21a1d9572fa

  • SHA1

    dc960892171fb43cd1672304f6d2125764bc3437

  • SHA256

    7bf6e326223c2eeb039b713e9dd226505b620105cd18de92b64262ec40353dea

  • SHA512

    a9c22b179b4e10a3ce9b0d8ba0182103d60d6266406c6f79e0fe91bc18366a8ba8c87c06f74e1ead79cb045ad65f22a22f38bda4e5c8658c7c75413e0f41d051

  • SSDEEP

    768:ieCTK/cC1ZQP6vF9U/fvX4zWSTntxUKHmDrm/mlsd:ieCTO5c0eXXYPnwk6sd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a20f32c420c7d05f349a21a1d9572fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a20f32c420c7d05f349a21a1d9572fa_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1620

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\WowInitcode.dll

          Filesize

          41KB

          MD5

          a7bae3140dee6d02d0745666069735a7

          SHA1

          b6d410859444a22ff8410b72024ed99abdf1df74

          SHA256

          c69980c2156ac955483372fd41130643bc397c9f89dabc7ae1caf2d311bbd389

          SHA512

          ad88a60f661f1e591e8820e834e74702b41ee0367f9a328f6bae037d0854926a10d521c96777156c050813f7276f3ae359b74dc42c629926369b25afb2e39cfa

        • memory/1620-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1620-6-0x0000000002270000-0x0000000002284000-memory.dmp

          Filesize

          80KB

        • memory/1620-8-0x000000000041C000-0x000000000041D000-memory.dmp

          Filesize

          4KB

        • memory/1620-10-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1620-11-0x0000000002270000-0x0000000002284000-memory.dmp

          Filesize

          80KB