Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 08:50
Behavioral task
behavioral1
Sample
f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe
-
Size
74KB
-
MD5
f321279da0521f2ade08d6cc455d1eb4
-
SHA1
958df922819d9fb6ce768ce27c6d7733118496a1
-
SHA256
823b3c38682756d0d4f6319bb9b10531370f3d8815f484f08c742764b889c951
-
SHA512
39fd11e930a26da1d3e1205b0912661ec4ebfd622f553df719a8dff2fa122ab08388f8bfe7733957489608b053a14901a498e01ae5b3564ead2af3ebc8dd333e
-
SSDEEP
1536:92zmGfRgTm1vl58W9ILKs+UHo53/KCYOLARiAfLiVaKAuS:2mGfRgTm1vz87Ks+U43/V0fLi/DS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2872-1-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2872-3-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2872 f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe 2872 f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe 2872 f321279da0521f2ade08d6cc455d1eb4_JaffaCakes118.exe