Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 08:15
Behavioral task
behavioral1
Sample
f79c483097209d96a93ee2c668888613_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f79c483097209d96a93ee2c668888613_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
f79c483097209d96a93ee2c668888613_JaffaCakes118.exe
-
Size
82KB
-
MD5
f79c483097209d96a93ee2c668888613
-
SHA1
be7a20ca403eeb71e0523cb919f471829fd1f692
-
SHA256
13ea6f1d029dcdfa3175cd579cfa26b74c856c9d48c41e17e36d770cbd4c8e91
-
SHA512
2a0cfd1a7ea388cba658a62ff15cdda860b220f4b76fff4198ee63791eff083b7b766f509e4b18376b282717c166afbd6bbf957e71aa93f81e8e27837794fd24
-
SSDEEP
1536:jc3u7F1e4zHvpad4WAwAEV5Q2yVgIXtA1IqDEbZWAz+Fqeyh0CjN+jQg:jsAzxad9DFxyGIe2UIZWS+5bCRg
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1704-0-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 f79c483097209d96a93ee2c668888613_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1704 f79c483097209d96a93ee2c668888613_JaffaCakes118.exe