Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 12:49

General

  • Target

    5c025fee6ce0893d14e502daa246b8ac_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    5c025fee6ce0893d14e502daa246b8ac

  • SHA1

    825b97fe94e9e9538839d0c271588043ff70b2f5

  • SHA256

    774374c2d613756d7a5873b24581bdf1630655b8eef3dd46fe6297b26c763f02

  • SHA512

    d3a70fd66f3d8a8af6cfd215a84c65b76661e31f11a253df80e61a3078c8331dbf530170abec1d8de10ebeadee40f179fe6c1eec9e1766c5c485262a32d72820

  • SSDEEP

    3072:8okXQwtigTNV0tVQk6m4Ro/hSHOEn1Jx49ab:6tfP6VQkd2oZGOEn1JUa

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c025fee6ce0893d14e502daa246b8ac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c025fee6ce0893d14e502daa246b8ac_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1140

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1140-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1140-3-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB