Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 23:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe
Resource
win10v2004-20240704-en
4 signatures
150 seconds
General
-
Target
2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe
-
Size
272KB
-
MD5
2e3598a16e81a4ba933205ef6f82e959
-
SHA1
774530b82cdb722e0f764b2cd6c1af0dc5345a38
-
SHA256
bd0de3a134120256b8850c1f17c47d08734c8f120b61eec5f21e417b16a59766
-
SHA512
d63069188b192ae0ec386ac38d7d7136c948d63f6554134b925e0ed12a788f826fd5adec30ee89c2532684e03fb904de09fdb6253b73224eee57a7e5bd18bfe6
-
SSDEEP
1536:L9MJ249icel/Z01/NBX4UDpegM3zwACUJGLq42GrElP2T/1oHd5RVJ6wmo7ucR9V:eX0e1FB/DpKjCLHAmoR1BbyRDSD
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2300 set thread context of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2300 wrote to memory of 2492 2300 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 29 PID 2492 wrote to memory of 1388 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 20 PID 2492 wrote to memory of 1388 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 20 PID 2492 wrote to memory of 1388 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 20 PID 2492 wrote to memory of 1388 2492 2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3598a16e81a4ba933205ef6f82e959_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492
-
-