Analysis
-
max time kernel
13s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
-
Size
612KB
-
MD5
35e0ad8c45cb719eb5b7538a0563ad21
-
SHA1
888538647c48f2d8fc431be0929aad988ced4d73
-
SHA256
3f6aa25f3e753b457690bb50bd7ebddaab3239d5bf31154a0e66d87cda7d5d4d
-
SHA512
4ed9358f2ffbe45f21e472b4289027fa7f63f72ae74389779cc4baeb300f2ce0f4a0f607e31a9de50e9a127abc681bfb011e99fc6e18d3524dd90f7be7ca053d
-
SSDEEP
12288:QeJFjRaMKczxLvnU5Q0TPlO4HBOtyCHdvu:QQFcOlLvnU3TPlOoBMHd2
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2432 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe 2432 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe 2432 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe 2432 35e0ad8c45cb719eb5b7538a0563ad21_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227B
MD5d9913b1ad9b6fb152ec98cd5c5a43b19
SHA191bb1c9fe5f12bf959be2e9f4eeaf2be86803d93
SHA2567f5d91e6c8df137c147c3ef155ed0838d85fd9910b18217e8bcd24a6efdd9fab
SHA512dce1cb24ffb1e3b8088853d23c7a76539b731f62b4e3f827335463589927712fa77699e917be7484ae70da328c459edb7cebe92679f84457bd532db553f1bf81