Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 10:43

General

  • Target

    5b99476f436b34705a650eff2962bcfd_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    5b99476f436b34705a650eff2962bcfd

  • SHA1

    e804b16f023b12e7f988006b3c4aae5c52992eed

  • SHA256

    9bd74e0c23f28ccfa4e05b9a0dcf7a6e15f44a978211c69efeb4c29bb0d00848

  • SHA512

    ba86b5554c32f5c20611479b00ad7ccb515cee7ba8e05914115957646394255ad8efc649d7c1344545a8014171d5395f85e25b01588bb42079d2b4c88920ce7d

  • SSDEEP

    6144:kQU7J/8YUaJEtUEuBTvH898LM9mkgmUe5HqWLd1zh6FSA:kQU7J/8YUHUEuBTv28LM993dd1FhA

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\5b99476f436b34705a650eff2962bcfd_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\5b99476f436b34705a650eff2962bcfd_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3388-13-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3388-14-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/4252-8-0x0000000076680000-0x0000000076770000-memory.dmp

      Filesize

      960KB

    • memory/4252-9-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/4252-2-0x0000000000B90000-0x0000000000BA0000-memory.dmp

      Filesize

      64KB

    • memory/4252-1-0x0000000000700000-0x000000000074D000-memory.dmp

      Filesize

      308KB

    • memory/4252-0-0x00000000006D0000-0x00000000006D1000-memory.dmp

      Filesize

      4KB

    • memory/4252-7-0x0000000076680000-0x0000000076770000-memory.dmp

      Filesize

      960KB

    • memory/4252-6-0x00000000766A0000-0x00000000766A1000-memory.dmp

      Filesize

      4KB

    • memory/4252-3-0x00000000776A2000-0x00000000776A3000-memory.dmp

      Filesize

      4KB

    • memory/4252-10-0x0000000076680000-0x0000000076770000-memory.dmp

      Filesize

      960KB

    • memory/4252-11-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/4252-12-0x0000000076680000-0x0000000076770000-memory.dmp

      Filesize

      960KB

    • memory/4252-4-0x00000000006E0000-0x00000000006F0000-memory.dmp

      Filesize

      64KB

    • memory/4252-5-0x0000000002510000-0x0000000002520000-memory.dmp

      Filesize

      64KB

    • memory/4252-18-0x0000000000700000-0x000000000074D000-memory.dmp

      Filesize

      308KB

    • memory/4252-19-0x0000000076680000-0x0000000076770000-memory.dmp

      Filesize

      960KB