Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 18:30

General

  • Target

    5d25f67d4dcbdeead1b153ab06f9f771_JaffaCakes118.exe

  • Size

    86KB

  • MD5

    5d25f67d4dcbdeead1b153ab06f9f771

  • SHA1

    34011f72dfabfda1ab026507f5fdb3d0fadf4f5a

  • SHA256

    86e9fb57d7f37c56b5f455bbd1ad7f7561654b5f18d4842be7a8c43b16730e64

  • SHA512

    757a7b77d0cc0e11324af8f01bc54815abb792a9d0c31c979bf88138eb4cedbd0ae790bd0621e488be9aedc964d3f13d9ea9650321d5406d2ee02cac45efb457

  • SSDEEP

    1536:WIP0syzVZLbffC6Hh1vdvxUtLmEdMgwwsLbyR9LxwnSsXEqw2G6bfuPHUjnYjV/O:J0ssVlLCMnnUtnMgGHyH7sXEX2GDgaHY

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d25f67d4dcbdeead1b153ab06f9f771_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5d25f67d4dcbdeead1b153ab06f9f771_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\prm3

    Filesize

    2KB

    MD5

    351ad8b416af82a2a9a46bea7afe7a20

    SHA1

    1c1278c5d43fb70f35525dd9c6c0daf2948e1289

    SHA256

    11ce3597d84f6b59a47b060384f10cab18d93bf7e66c6732c9747ddf63a4e865

    SHA512

    7cedaad5858c2ecbf14431a5215f347cf6cf827cd3c8febd105bfcaaab8179490ad0ed01d55adb0f11900a48f33b18b1e74541097435ef3062204fe4aa2bfbaa

  • memory/376-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/376-1-0x0000000000402000-0x0000000000415000-memory.dmp

    Filesize

    76KB

  • memory/376-2-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/376-3-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/376-22-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/376-23-0x0000000000402000-0x0000000000415000-memory.dmp

    Filesize

    76KB