Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 09:04

General

  • Target

    66f0de26b965278fdd07d5fe86262d3d_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    66f0de26b965278fdd07d5fe86262d3d

  • SHA1

    572d8dc9b22ba642e6a4fc9ce9615e46b4d30ff1

  • SHA256

    cfd150d72de92b43c8619647bc0c961de38c3a0dbda04b6b18b13c4575cfed5b

  • SHA512

    9591cccc2d3eec4ec797e3247c9ba2459a941dd7c305844a2539bc01a7b680daefabcea434825ebee82331daa4e820b42221dbc58a595b8a7974ca145888f727

  • SSDEEP

    1536:E3B+7UwzY3LSakFXcr1x+mNNVfe2L5ngz5ZhWgNnOKPRV8o6Mzz3r:UB+b3uNDxL8ZAgYKP4M3b

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f0de26b965278fdd07d5fe86262d3d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66f0de26b965278fdd07d5fe86262d3d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\AppData\Local\Temp\66f0de26b965278fdd07d5fe86262d3d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\66f0de26b965278fdd07d5fe86262d3d_JaffaCakes118.exe"
      2⤵
        PID:3424

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3424-2-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3424-4-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3424-5-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB