Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 07:44
Behavioral task
behavioral1
Sample
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
-
Size
420KB
-
MD5
90fdcc5f8605a96c9c44c839984a4ef5
-
SHA1
2b5505b7655620bc9c50d64be528a3da7cb73560
-
SHA256
739c062d5196d98e1e56f543b3337561ac2f0f468c40de66898e941b3cc5a7ff
-
SHA512
3ed10857c0ecd43a0118ef5d6404caf143e3617ab747aed1fe61299041c393115ed2f26499c6b04c84209c44b6d421c06729b30871c2c674ed03593bb9085fa7
-
SSDEEP
12288:cDZdOe5Jix7mmtv5+JlNDUb+825ECFAzoS:EZr5wBPtEJlNDUb+825Eo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral1/memory/2416-2-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral1/memory/2416-3-0x0000000000400000-0x000000000056D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2416 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2416 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2416 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2416 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe