Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 02:57 UTC

General

  • Target

    65df70dbe9cbbe984a94121f4acbce79_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    65df70dbe9cbbe984a94121f4acbce79

  • SHA1

    21d3daea4e57dc3c44088461393dbedbaf6404ff

  • SHA256

    a0e0f54517ad584fb00a206bbd854c8d2eb7e9319c10a6005d0dfe73839f451c

  • SHA512

    b1cb2ce75ca192bc57e377414386dc48df1ef798c4b6358f4ab5341b65fba3921f4b32601339cdb8c2cf11c140bbd7b3c3adeacdb225d4d9a3f7f2c33bf92c45

  • SSDEEP

    3072:ZSVCuNzoCfA6YFLqmZSr+ox1iYDWejKXAH4xqrl6TvXfLixbU:ZpuNzvY6Y9lQRbqXA3mvDq4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65df70dbe9cbbe984a94121f4acbce79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65df70dbe9cbbe984a94121f4acbce79_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2080-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2080-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.