Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
2c71726eaf541fb9608cf2a1fbc37e6c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c71726eaf541fb9608cf2a1fbc37e6c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c71726eaf541fb9608cf2a1fbc37e6c_JaffaCakes118.exe
-
Size
120KB
-
MD5
2c71726eaf541fb9608cf2a1fbc37e6c
-
SHA1
805e16968e25cb7bf57e5d342bfb687f7f74a27a
-
SHA256
a36041a560d2411ca2cabe0fa90f7ccd5218e12493986145e21e832d6e87769b
-
SHA512
3b090d549693b43654c0b7d8172067171f4488a94be065305e266539373f73f895b8d663a8571db2789adb7c89e62582308d18b644ba08807efe4259d8f2bad9
-
SSDEEP
1536:n2TQmz7e8r8zjmVO3w6Eaqn8zpOJkSXNvf36aqeJuVVO:nWZC8rwPz2tE8
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1Ed20ifLUd2sJyOtjGieeVM4gWJnn6uu-
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
resource yara_rule behavioral1/memory/1412-2-0x00000000003A0000-0x00000000003AA000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1412 2c71726eaf541fb9608cf2a1fbc37e6c_JaffaCakes118.exe