Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 07:47

General

  • Target

    5f9fec0c71128993e03c19e0922a388b_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    5f9fec0c71128993e03c19e0922a388b

  • SHA1

    f77e71c3b8b4a4088476fac947f83fcf02081a3e

  • SHA256

    f12cb2aa73930515a449b4f4133621dff0eaf8df8316b91d4c2357b4d108af6d

  • SHA512

    d9cb0203551843c8f54c024d9f84f30fb8c95d3ce046e1ca400ac22aec64175e03e685ca9fa0755cdd1cf97d59eb3f8f12c18591e91e6f873b8f497643091833

  • SSDEEP

    49152:p1KunSh+G9wyEW6jYJnC6vYvcCeEcn7DPeoKDSLQYxaNYXP:p1KuQ+KwnWWYRC6vYUpEcn7DPeoK+txv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f9fec0c71128993e03c19e0922a388b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5f9fec0c71128993e03c19e0922a388b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\5f9fec0c71128993e03c19e0922a388b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f9fec0c71128993e03c19e0922a388b_JaffaCakes118.exe" --123
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads