Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 20:26

General

  • Target

    64adfac64accf92a3aa747ab5bc3119b_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    64adfac64accf92a3aa747ab5bc3119b

  • SHA1

    94e29ceb0249c8a58384981403dce3eac28dae13

  • SHA256

    b52626ef81ab8161acfa9638779f56f3a31a643c2b34a8fdfafb6e1492fc403a

  • SHA512

    69e60a8f95bf435232f63f21256d331b7843641109112a33e5cda54d66b6c16e7030d9a1990f872278356d2bb6e912bcd2ac39b2da5445ee3d159d19423a2b46

  • SSDEEP

    24576:zYtwvpnlgSN0h8pPwMFTgLvOmFBAHNYiqFOpWT+yhqcmz:zYqGS57SG1tF236yhqn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64adfac64accf92a3aa747ab5bc3119b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64adfac64accf92a3aa747ab5bc3119b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\64adfac64accf92a3aa747ab5bc3119b_JaffaCakes118.exi1

    Filesize

    51KB

    MD5

    63d959c8a183a53791fb488b7b69ee21

    SHA1

    67a8920aad7c317d3b93c5bb09011035b3f0d1c0

    SHA256

    1c6787ed25736ff42ddf7b0094f53c557fc6002f5f56161722404c08539e4cdf

    SHA512

    d0f66fc1e9d7a6508b1048118c339c1312680aa56b143e0ea21a97cfc680d9d8b87b40cc936da3a855f55fd2735aacdd9a5d4ccd3dc0d1a95191c3a4d82fb018

  • memory/1936-0-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/1936-6-0x0000000002460000-0x0000000002471000-memory.dmp

    Filesize

    68KB

  • memory/1936-10-0x0000000002460000-0x0000000002471000-memory.dmp

    Filesize

    68KB

  • memory/1936-9-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/1936-13-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/1936-37-0x0000000002460000-0x0000000002471000-memory.dmp

    Filesize

    68KB