Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 07:44
Behavioral task
behavioral1
Sample
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe
-
Size
420KB
-
MD5
90fdcc5f8605a96c9c44c839984a4ef5
-
SHA1
2b5505b7655620bc9c50d64be528a3da7cb73560
-
SHA256
739c062d5196d98e1e56f543b3337561ac2f0f468c40de66898e941b3cc5a7ff
-
SHA512
3ed10857c0ecd43a0118ef5d6404caf143e3617ab747aed1fe61299041c393115ed2f26499c6b04c84209c44b6d421c06729b30871c2c674ed03593bb9085fa7
-
SSDEEP
12288:cDZdOe5Jix7mmtv5+JlNDUb+825ECFAzoS:EZr5wBPtEJlNDUb+825Eo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x000000000056D000-memory.dmp upx behavioral2/memory/2804-1-0x0000000000400000-0x000000000056D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2804 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2804 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2804 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe 2804 90fdcc5f8605a96c9c44c839984a4ef5_JaffaCakes118.exe