Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:02
Behavioral task
behavioral1
Sample
684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe
-
Size
516KB
-
MD5
684ada5329426d8284eedd28b69002f7
-
SHA1
a4d34c93891354539ad59bcb7aa2e85e358c25a4
-
SHA256
94bbda1fc7db69f5d7beef7b9ca22adec98a2f657465b886ba3538a2171ea16c
-
SHA512
8057ab549a1e91c80e72cbaccfcb78266464928989db93bd221787ac3e5be363bb6e4eefe1306e54d1aa7623b44a429b1dab700e77911c0ee38f519390707562
-
SSDEEP
12288:fjsvpWVik/984SrPJ1tFKux/eSbTOpv8tH0I5ABvgdj:fjYpZqivPPtFXleGTOx8tH0YAgj
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2328-0-0x0000000000400000-0x0000000000565000-memory.dmp upx behavioral1/memory/2328-32-0x0000000000400000-0x0000000000565000-memory.dmp upx -
Processes:
684ada5329426d8284eedd28b69002f7_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main 684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
684ada5329426d8284eedd28b69002f7_JaffaCakes118.exepid process 2328 684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe 2328 684ada5329426d8284eedd28b69002f7_JaffaCakes118.exe