Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 16:52
Behavioral task
behavioral1
Sample
2d19124d62e76a0ae33e5642f0c73ddb_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d19124d62e76a0ae33e5642f0c73ddb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2d19124d62e76a0ae33e5642f0c73ddb_JaffaCakes118.exe
-
Size
145KB
-
MD5
2d19124d62e76a0ae33e5642f0c73ddb
-
SHA1
4ebcfebc2c6642d438c17b7e1596fefcb9ae1afb
-
SHA256
5328d6a5221c05f7ac9654ba597fb5d92b07d631ca94116b72d0a127bf913312
-
SHA512
6d04f570db591c8f84def7ffe071cb6ca124b00c6d2cf11230348e487382ff98f18ef7f14d6921543f259319f4c2b37bf004f2f996ddb0f424fe2cb0f4f76833
-
SSDEEP
3072:9ykb23UPDxZExPhzVTVpw0pW2XiY49MZ66TJ0A7MKYccJS3zQvZ9OW:T6gDxqxPhRhpw0pDXiYVg237MK2Jfvnf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3924-0-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/3924-1-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3924 2d19124d62e76a0ae33e5642f0c73ddb_JaffaCakes118.exe 3924 2d19124d62e76a0ae33e5642f0c73ddb_JaffaCakes118.exe