Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:10
Behavioral task
behavioral1
Sample
0b721160ca9cd7c3c88cf3ef8faea7e3_JaffaCakes118.exe
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b721160ca9cd7c3c88cf3ef8faea7e3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
0b721160ca9cd7c3c88cf3ef8faea7e3_JaffaCakes118.exe
-
Size
156KB
-
MD5
0b721160ca9cd7c3c88cf3ef8faea7e3
-
SHA1
52cb92cbf2441d256811948f3a98e4a5fac3e8f1
-
SHA256
c063feba84c0340f8ca416ad9c6ff3a49e7786470c3f9101ba2c9cb3d4103a6b
-
SHA512
ef636b70bab0afb1720efa1d8a2030a3689d2bb00ab5fa3e19e5e031f5d7109e1ee4e68f18c7ae6a8b99e88126ce049b070c6f39c870c15d0b5966ef372555cb
-
SSDEEP
3072:zapnTcc26V+JipJIKyyezxsasdySqlW69s46FVD4IS:uXJIKNeNXsdySqoIs4eVD4
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x0000000000447000-memory.dmp vmprotect behavioral1/memory/2080-1-0x0000000000400000-0x0000000000447000-memory.dmp vmprotect behavioral1/memory/2080-2-0x0000000000400000-0x0000000000447000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 0b721160ca9cd7c3c88cf3ef8faea7e3_JaffaCakes118.exe