Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 13:11
Behavioral task
behavioral1
Sample
0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe
Resource
win7-20240215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe
-
Size
353KB
-
MD5
0351360d7274027a7e3c3d546605ac2a
-
SHA1
2a9882a33ea3d64fa78d2e341b0966852c19e59c
-
SHA256
120764439e1adc28b8f103b8c68784a5958c56c12994fa470dba36789b0481f7
-
SHA512
51dddba7b552f6690688b054d5f4fd2d378077738a37e83776c57ccfae050b9d33677efabaa42d37bb172c20078e42b92223097a4be19677d81febb1be15ccb8
-
SSDEEP
6144:Plb6QHsdyv9XmN+iqjPyVvXquaJSQfUW51+novR5JnKX8Cf0yE:PlUyd++PjPyVvXFaJSQfJ51+nkHJna8l
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4032-0-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/4032-2-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe = "0" 0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4032 0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe 4032 0351360d7274027a7e3c3d546605ac2a_JaffaCakes118.exe