Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 03:55

General

  • Target

    5a5e48064611e7d6f954b6047f9ec257_JaffaCakes118.exe

  • Size

    713KB

  • MD5

    5a5e48064611e7d6f954b6047f9ec257

  • SHA1

    e38021b0e03f599c7a3f0ec50643156e66ae439b

  • SHA256

    5fa6fa3b4d912685499854742e7e1b6af925f8ac4f3ce752754fd16d2d1072a9

  • SHA512

    b8ecc201780b7f24aa613bf1e866b9a3ace923673de471b86136c01bda309b8ba65dc23ecfc5144e9ed65a12a90f56de3da43886d7b33a994c20b864dad0230f

  • SSDEEP

    12288:OqL9DM6YJqolb2lF9bJCPnBJH9I1yr3QHnWe8CMCxYZARHDuXVCqIsA099cj8:19NYo1lFuZDjQHBMCxJRiCqIsAxj8

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a5e48064611e7d6f954b6047f9ec257_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a5e48064611e7d6f954b6047f9ec257_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:5056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5056-0-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/5056-13-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB