Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:02
Behavioral task
behavioral1
Sample
0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe
Resource
win7-20240508-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe
-
Size
4.3MB
-
MD5
0f2d18d7d7839741b7983a0fcad97451
-
SHA1
ad2d64a67a9a84454cab0afba93fc817cc7c41a4
-
SHA256
59add952c824bb38fd209637f75e319aa8d992c7ef6401b67727cfa4adfdc177
-
SHA512
29fe947fde62f70d370da953d4a0b0c197cb25202ba5179fa56610eb7ca8e222f42926884c438818d73359ac53e36bc4452c7401fdb2f863ed8855d4ecaeb4fd
-
SSDEEP
49152:35t8yKuC3rrX5p++yJERPx6Fx6j0swWsRBTc8AxPA6Grcen2kcODcG2NMPO+AZXM:3IX7ySSswFt6GIen2Y52JpUjEN037LL
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2972-0-0x0000000000400000-0x000000000068D000-memory.dmp upx behavioral1/memory/2972-21-0x0000000000400000-0x000000000068D000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2972 0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2972 0f2d18d7d7839741b7983a0fcad97451_JaffaCakes118.exe