Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 12:33

General

  • Target

    60975feddd4d30cfb8707869a6139fe1_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    60975feddd4d30cfb8707869a6139fe1

  • SHA1

    2e78d907067934753da513742b6b50e06b828a27

  • SHA256

    9ab4ce6aee4ec88f8b5751dd7966a3cf8d7f9ef14736e63067466b8577d37ed9

  • SHA512

    29d4ce97c3b810eee9aec3348bb8bfdb4122d9e258b7ca00792c4f12b78be61f089dd45e46fffc31200288900ca9223ed2205cbb7ce8fe94f773457cab191c83

  • SSDEEP

    6144:HU1UAomP9Veo1SKm1ebkvIgD7cftKC7dvaLNs/w4d2pPK37Zc769/c:HyomzSKpTgfXOCs/w4duyLZc769k

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60975feddd4d30cfb8707869a6139fe1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\60975feddd4d30cfb8707869a6139fe1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\60975feddd4d30cfb8707869a6139fe1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\60975feddd4d30cfb8707869a6139fe1_JaffaCakes118.exe"
      2⤵
        PID:2480

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2480-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2480-5-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2480-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB