Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 07:56
Behavioral task
behavioral1
Sample
f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe
-
Size
172KB
-
MD5
f7933ce6945c64abab6ed95cff2d815f
-
SHA1
9592a9cede9e0c140830c628caad4e9d3fd2092f
-
SHA256
551bdefca2e80ae755065d30aaea17acc102c1a9ab065e3cecbf7f66b2dc69d0
-
SHA512
0643e0ad4fe3922bce9fa51b7c47bbd629b9b7be3aa98efc9153fd5429cb5beafeffc4bd03f5a7ca50584d5a99c789cd161bf00f146bf0435cc9a9c2e74d2ba8
-
SSDEEP
3072:97b5RROKc4Jrfz7VivDHJMZy4Q4pxm6OJfGWwGP08PGxruNh4R3L7GG+e/dZk5k+:DRROZ4Jf74rHCZNsepGnNh4p/5dCecg8
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3016-0-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3016-9-0x0000000000400000-0x0000000000455000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3016 f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe 3016 f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe 3016 f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe 3016 f7933ce6945c64abab6ed95cff2d815f_JaffaCakes118.exe