Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe
-
Size
105KB
-
MD5
0b7bfc530ac65278966f52af2d483c9a
-
SHA1
854e09e0e28e374b6d4cb757cef76b060dcf30f6
-
SHA256
1a51e77f49da3cb39341f5005b33fe4aea509e1dc4b153693c34d8f1056d545c
-
SHA512
eb5f583aa3bfcde0a7274aa2b34593126871620a864622a6f38b0d57af4447784d935a22aa8a92aca55988ba5d6e7046c20888b4b4e8872529e4d44372db271e
-
SSDEEP
3072:1X07lTw97oAV2hXnZ/CPyX+gHNZxPA0JU2Qv0LmE:xcAV2VZ/CPYNZxPvC2A0L
Score
1/10
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28 PID 1484 wrote to memory of 2132 1484 0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b7bfc530ac65278966f52af2d483c9a_JaffaCakes118.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2132
-