Analysis

  • max time kernel
    141s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 03:49

General

  • Target

    5eeb6efa5fa4d02a7eadca34d11ad44c_JaffaCakes118.exe

  • Size

    709KB

  • MD5

    5eeb6efa5fa4d02a7eadca34d11ad44c

  • SHA1

    4b9c037a59b9fdd8b956cb184519ab3ce77ef467

  • SHA256

    92ad60c700c7e30728e6b0ab32a9c6431e3b06e19e2d8a2871269a818e527e10

  • SHA512

    f752bb990b93ff6c0ee1849301bf3574c73074d5df4215357fcce47574d7e400161b216056fe33778be28894f5139b59beab88a36c29180607b2d2a6931008cf

  • SSDEEP

    12288:Ofnvm+j4FFDEQGhpUtRYhIwAUnHZxiWDDx3EIx06V28d77PdmYbiOqpXwsk7f234:OfnhYFvPQlcEdn2A28dDdUOqY23XOC+T

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eeb6efa5fa4d02a7eadca34d11ad44c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5eeb6efa5fa4d02a7eadca34d11ad44c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\5eeb6efa5fa4d02a7eadca34d11ad44c_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\5eeb6efa5fa4d02a7eadca34d11ad44c_JaffaCakes118.exe
      2⤵
        PID:116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/116-13-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/116-22-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/116-21-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/116-14-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/512-7-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-8-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-11-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-12-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-0-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-6-0x0000000000401000-0x00000000004C0000-memory.dmp

      Filesize

      764KB

    • memory/512-15-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-16-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-17-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-19-0x00000000007A0000-0x00000000007A4000-memory.dmp

      Filesize

      16KB

    • memory/512-20-0x0000000000401000-0x00000000004C0000-memory.dmp

      Filesize

      764KB

    • memory/512-2-0x0000000000400000-0x000000000053F000-memory.dmp

      Filesize

      1.2MB

    • memory/512-1-0x00000000007A0000-0x00000000007A4000-memory.dmp

      Filesize

      16KB