Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 00:23
Behavioral task
behavioral1
Sample
2e5c7a5e122231bf6e6cee67fd44eaef_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e5c7a5e122231bf6e6cee67fd44eaef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
3 signatures
150 seconds
General
-
Target
2e5c7a5e122231bf6e6cee67fd44eaef_JaffaCakes118.exe
-
Size
77KB
-
MD5
2e5c7a5e122231bf6e6cee67fd44eaef
-
SHA1
fe84c7d9c48730535ecfeee220153d5c253fb292
-
SHA256
d98e8ab30ecb50f62a0233336e07728180ba0e58eeb81c32e4f88dfb52bc19b5
-
SHA512
5496b1af66554567b68dd323c6ba70e1d4386dadebe0152f933cf88d0797dc106f4c0340cb80158f4f9bb954a78a5aa13ec0e40d7f53d36c4928faeb4f006646
-
SSDEEP
1536:q3XuUnGiMEP2/GUqzRWp/9DDDjIlt85zKuy6cNpNMUXNZMn3P:6eUl2eDA/JfjIlyKDNpGiNyn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-1-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-2-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-3-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-4-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-5-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-6-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-7-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-8-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-9-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-10-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-11-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-12-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-13-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-14-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral1/memory/3032-15-0x0000000000400000-0x000000000049D000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 2e5c7a5e122231bf6e6cee67fd44eaef_JaffaCakes118.exe