Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 20:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ab55f16db52c3430cc19afaa63b5d8fb_JaffaCakes118.exe
Resource
win7-20240611-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ab55f16db52c3430cc19afaa63b5d8fb_JaffaCakes118.exe
-
Size
448KB
-
MD5
ab55f16db52c3430cc19afaa63b5d8fb
-
SHA1
a3db3a4612d310385537a01c40f7e38d58f9855c
-
SHA256
94b80f7fb5f9009cd381b5ad6dbe59e3bddf08d937807f685c93ce24d016430b
-
SHA512
d93b6c23f063a013ddf3f1f40da5d9838bf6e2d42efce08cb12da5bfcd9716d3e531ced4383fc0a4622c428780153c6086d54b9187fbae1a1b62150c409c166f
-
SSDEEP
12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCxR:4xBAiAHwfzY
Malware Config
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/4952-3-0x0000000002300000-0x0000000002332000-memory.dmp dave behavioral2/memory/4952-9-0x00000000022D0000-0x0000000002300000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ab55f16db52c3430cc19afaa63b5d8fb_JaffaCakes118.exepid process 4952 ab55f16db52c3430cc19afaa63b5d8fb_JaffaCakes118.exe 4952 ab55f16db52c3430cc19afaa63b5d8fb_JaffaCakes118.exe