Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 12:22

General

  • Target

    1358899936e19ea149dee094ac12e238_JaffaCakes118.exe

  • Size

    471KB

  • MD5

    1358899936e19ea149dee094ac12e238

  • SHA1

    6a0e981f5dc800f6397dd4fe58ca90a4496e0819

  • SHA256

    1974a7ec77e4bfd9ac85e53f3f9eddcad8802ed6889b9b173a2ba6a6a46677a5

  • SHA512

    e8e90dbf1fcb8ece3b468c2ff1a35c5a3a68a3f0e163c243c5e7819b69552c4d2d98b6d426a344d8467c073b317d64f8043f43f4b2c90f971fb6b0bc970f8e10

  • SSDEEP

    12288:J7hkfSFCyXiral4yrmjMr6gORwnX/h/lPcj:1Gfa5rUw6klPu

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1358899936e19ea149dee094ac12e238_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1358899936e19ea149dee094ac12e238_JaffaCakes118.exe"
    1⤵
      PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-0-0x00000000000F0000-0x00000000000F1000-memory.dmp

      Filesize

      4KB

    • memory/1620-1-0x0000000000100000-0x0000000000101000-memory.dmp

      Filesize

      4KB

    • memory/1620-2-0x0000000000190000-0x0000000000192000-memory.dmp

      Filesize

      8KB

    • memory/1620-3-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/1620-14-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/1620-13-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/1620-12-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1620-11-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/1620-10-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/1620-9-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/1620-8-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/1620-7-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/1620-6-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/1620-5-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/1620-4-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/1620-15-0x0000000000200000-0x0000000000202000-memory.dmp

      Filesize

      8KB

    • memory/1620-16-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/1620-17-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1620-18-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/1620-20-0x00000000006D0000-0x00000000006D1000-memory.dmp

      Filesize

      4KB

    • memory/1620-19-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/1620-21-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/1620-22-0x00000000006F0000-0x00000000006F1000-memory.dmp

      Filesize

      4KB

    • memory/1620-23-0x0000000000700000-0x0000000000701000-memory.dmp

      Filesize

      4KB