Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe
-
Size
163KB
-
MD5
fb6b1037478e0b4c2f03a0a7142f501d
-
SHA1
8a8b754ba9297fa104bc28174f11a1c643187e64
-
SHA256
bf7688dc3fabc84f6758b6984e9d4505686aab48b2203fe55ba01b9e0f95d441
-
SHA512
5cb44ce9220c6011a333fa42554713550f2503427e48c797eae3d48bbc49d2860a71626afafc53d6dbee8cc73e6720863ea37442e9dd2f615dfc4fd1c5bad207
-
SSDEEP
3072:S/I9IOmQdvx+v9e9FJqjzQiFvsTiwG5xx3N0v3e7CaiSaGM8bwd7HDFx/y6g:Sgdpxx+2qjzQiRfR5790v3wCfH7g
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2380 2988 fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb6b1037478e0b4c2f03a0a7142f501d_JaffaCakes118.exe2⤵PID:2380
-