Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
-
Size
104KB
-
MD5
313cd4d2b406d9a71804238f6e8bafbd
-
SHA1
20dd5390076409b55f1eb59da7cce83d7fbbf849
-
SHA256
ab4866124d555f988e03f4385ee60fe984fac77e71f24ab2ab985f94ced2bb4e
-
SHA512
52cb336ddc3ffde206f1a27afe31c3e7c10ce8792ed5407800c659aad5a747212dfe24cd37a2dca830d3a2134b93a161c5c09e4b2fc7fea1cc0dd285d9700ee1
-
SSDEEP
1536:go67yQgnYztnwkURbiPBrRif7K4cmR3H9hYMp7YewLlr8potg9CXjdpnC6ZRrqk:goD1Y9LURU9YT3c+3dh/8DG6Ycdgy
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD577391ab194f01aa24a355f32312c7b17
SHA1ea65e6db38a68ae0d75b2ba9fb98d6c084218bbb
SHA256f704342daa10370f984e6df9c037bbbb9721ca41a4f31b2e006135f0f308343e
SHA5128f02cecf05b767258ed83cdff25afebe433884ee8b58545ecca7f2bb8d111dfe9733397d6505ea19f3efaf7e5b06609688085b41770378c3e16b5dcc2e49e466