Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 00:27

General

  • Target

    620b90aa65a253f4cee8894052841fc2_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    620b90aa65a253f4cee8894052841fc2

  • SHA1

    2702a46486dec5c001b12db08cebed9ebb662450

  • SHA256

    0a6377e98da1fd95464e3086acf4bed39930371a6ec5f8e2ea86da3bfed40f57

  • SHA512

    4692bf76ed2cfdfd6b9c08cfcb088a90c21baab85ae431ea045e6507ce27f9461b6b1e29e469d8fb73f598a95c210b413638896a2623f213fa5f8894d39e9ac2

  • SSDEEP

    384:q3taecwB3HSL/STp4ayiQLMSjtBddd0GY:q3tOw1Hs9ay2addD

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\620b90aa65a253f4cee8894052841fc2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\620b90aa65a253f4cee8894052841fc2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\melt1.bat
      2⤵
        PID:664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\melt1.bat

      Filesize

      285B

      MD5

      3983fd3d1bb6d94e3d8e92fa9f472ef4

      SHA1

      810412b9cd5abbe8146c2c5a744d2d667d9973d9

      SHA256

      8a0addacb01f3f4bf4260feef7ee1a7d4434a011aa29f02d56b31bacaafea816

      SHA512

      8c921bed5ceb3d8462d4c9225a7095043a700076fd137d1aca57ef986e825e3f5e60f2729b5eec25eb7814059d2ac13fab45a37a486c4e3b401ee8abd0eafe42