Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 11:33
Behavioral task
behavioral1
Sample
ff2f756f674e4334d20b114833148962_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff2f756f674e4334d20b114833148962_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ff2f756f674e4334d20b114833148962_JaffaCakes118.exe
-
Size
197KB
-
MD5
ff2f756f674e4334d20b114833148962
-
SHA1
9b5a359e69063831c9f42611e937eed8d0103375
-
SHA256
5b88c20d94b7eebd37fe341b39fdae177aa734b0f83aaac4e50f1705eb6f3f95
-
SHA512
f18c00083d861cbeab8c293b8fd56ea57b525474b79f2ce6fe9f439b886d15f16d01e474adfea0b2cadb4793bef66c1367f8d59e2b68f0815618d9be142efc31
-
SSDEEP
3072:WUqHdwFQqPGUbW3yUuugO8ghbhW6VeEavY/qcPH15Mji6Id1920VpRhaP:fqHixf6EvcNWDEave/3P9hVPk
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral1/memory/2188-2-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 ff2f756f674e4334d20b114833148962_JaffaCakes118.exe 2188 ff2f756f674e4334d20b114833148962_JaffaCakes118.exe