Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
3102f605461887e29318e462dd1ef8cd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3102f605461887e29318e462dd1ef8cd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3102f605461887e29318e462dd1ef8cd_JaffaCakes118.exe
-
Size
92KB
-
MD5
3102f605461887e29318e462dd1ef8cd
-
SHA1
dde11d3e71974ff54bd32d040802b563c477a1e5
-
SHA256
fcf8c73e6ddc38f6c4da5f525e95aa853edc5334761730ec1eb85a672996021c
-
SHA512
dd2373dc1ec961681e2d20b2d2b6fff0a50dc58e6bcfb32866f4122d0d326876aa216490df4f95d14010af7fa89d006b14b9b72c93a5ee1b28281a9de23e654f
-
SSDEEP
768:kFs9mUrSgcXgnl2+KHueN6UXZv4udRBP5XJSeRVvp2KrhTqPgfuG1c:wBUVyYxeRXFj3R4e/vpZhTqo2/
Malware Config
Extracted
guloader
https://onedrive.live.com/download?cid=604AA6C584DB9137&resid=604AA6C584DB9137%21116&authkey=ABaSWnLIxt-uS2s
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3102f605461887e29318e462dd1ef8cd_JaffaCakes118.exepid process 2440 3102f605461887e29318e462dd1ef8cd_JaffaCakes118.exe