Analysis

  • max time kernel
    145s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 19:17

General

  • Target

    647608cd45590feeea9b75aafa85f114_JaffaCakes118.exe

  • Size

    4.2MB

  • MD5

    647608cd45590feeea9b75aafa85f114

  • SHA1

    b4259dd10c29ab1dd940469decafed37dc9a98e8

  • SHA256

    7ae338ff13afcdd8cdd809d587b9ee920ee461ecccab12d1a7abdcbc91f830a6

  • SHA512

    d3595e0ed2c452db8454b63df6d559bfae73c3546dbf0a1efed6f38c6c2a9ec40fbc7480653280baf818009fe38f7e809d8f0af681d9afdf4c7ae15e7a504b8e

  • SSDEEP

    3072:HaYbryJOFK29dWq542VLQXKf/17YPmSN8vWQcdg3jgkgpz3/29lMO2GLetTBfV4n:6eW0KCh/FYPBJW9gpD/2rMO1LetTBd4n

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\647608cd45590feeea9b75aafa85f114_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\647608cd45590feeea9b75aafa85f114_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads