Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 08:14
Behavioral task
behavioral1
Sample
2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe
-
Size
674KB
-
MD5
2f9b0d26e33cdb8a97fc1a3980c6ca5d
-
SHA1
ce63a66e4b1ce718ef42367472eefe9f42575138
-
SHA256
4b973a5dc54f19e73e577470aff01d8e70e780d2f5ee187db8c91e7b980c94f2
-
SHA512
df06b224fdd2442d3aed3db6a25a6dee1ca771dc354c5ac189f90f39e7bc2a73180de3da6fcc8555a9455780bd23faf734142e6e568b952ff9d039d3ef2e4739
-
SSDEEP
12288:M4RIuUexGHGUjRMFW9G6nMTQ8Un8M+LVnRvE9Frgn4RmVE5OlnSoOk4IpYex:M4SuUmQGUqWbnyQNn8MGV34gVBlSoOkt
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/8-0-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral2/memory/8-10-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral2/memory/8-16-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral2/memory/8-20-0x0000000000400000-0x0000000000579000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 8 2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe