Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 02:30

General

  • Target

    5a19d84dd95eaeaeb299042fbfea4f95_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    5a19d84dd95eaeaeb299042fbfea4f95

  • SHA1

    89bee07947f71e57e5507e3717c2e0159b4c0922

  • SHA256

    0b127136a2100c72c76822295d87a60c2b0a2fbae2cf886ba1abf08a64d808d3

  • SHA512

    d9ff174c5a8700ba5087c91689c1162798b734796ccabba4a6aec8fbbab474313fe5c570d241e91edd46411fbe482511719d80b68e3f9edd584c54881ccad73d

  • SSDEEP

    1536:wDmIXkCwDJidpHsBffT0m9d16lR4/79pwu769HAATtKtMGkhC+JA69:nUkCwDJid56T0mz1wR4j9p769gARuRwv

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a19d84dd95eaeaeb299042fbfea4f95_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a19d84dd95eaeaeb299042fbfea4f95_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Users\Admin\AppData\Local\Temp\5a19d84dd95eaeaeb299042fbfea4f95_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5a19d84dd95eaeaeb299042fbfea4f95_JaffaCakes118.exe"
      2⤵
        PID:1932

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1452-0-0x000007FEF570E000-0x000007FEF570F000-memory.dmp

      Filesize

      4KB

    • memory/1452-1-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

      Filesize

      9.6MB

    • memory/1452-2-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

      Filesize

      9.6MB