Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 20:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
3646c39f58e5e1352d227e8ac2e90f9b
-
SHA1
7c93900abd53dc16878e19deda8b8feebeca7b05
-
SHA256
81dd44d1d8b294476e38c5003d5eb1c1c5b10d02eea41514f5a5c19f4ef70d43
-
SHA512
fdde13e365125559e8f8b79be970532761d58cd59b5e52ab0aee95036381fc52d936ea8069151feb91b0f85cf5b1aeffa9dce8c1ea902e83b694c625aae99e75
-
SSDEEP
24576:8fobO/FhLa/N0KOHeYtajfKoTjelAcyfkSKYBlbAXP/bHnH:nbO/HL8NZOHHtWSwjelADHTM//bHH
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2504-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2504-60-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2504 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe 2504 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe 2504 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe