Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 18:59

General

  • Target

    bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe

  • Size

    432KB

  • MD5

    bcccd9ae8bc0b0b18d31f8ef6953cd64

  • SHA1

    255c6a76eb3e229036ec6e5c7dc6b7193bc7d6f9

  • SHA256

    dcde4ae0d37ce02d19a420afedb4e30267c9f727a4b32ac9d0345b630917f34e

  • SHA512

    572994b805163be8c69b2987d7f710787bd4ef3cac69786a90da5785125fee62a1978ff24590556b5b89a6b4e9d65dd888347523991e9cd050fc374c9b72bb93

  • SSDEEP

    12288:3X8XvwOSxtYrCsJbUxAuBedVry/zg9ze1ZvYLOltUX:3Qwf8rJ4BBwtybg9zspCjX

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1812

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

          Filesize

          406KB

          MD5

          d423ddb46deda1475185f29b3e195d4e

          SHA1

          5907017252c3e94e40db41d16d6a92cc466e4b05

          SHA256

          7f6baf772bf5cc8280a956019c2009e17c96c93995af6abd9580dad800579872

          SHA512

          74ba8a82da14d25ce87ea440c67834d72b414baee355d56730c902a7543880efc8ca866ec138c4b4a2780fdacfbcb7a9030fb9a990ac851f777140361cb3f153

        • memory/1812-0-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1812-4-0x0000000010000000-0x000000001012B000-memory.dmp

          Filesize

          1.2MB

        • memory/1812-5-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1812-7-0x0000000010000000-0x000000001012B000-memory.dmp

          Filesize

          1.2MB