Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 20:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
3646c39f58e5e1352d227e8ac2e90f9b
-
SHA1
7c93900abd53dc16878e19deda8b8feebeca7b05
-
SHA256
81dd44d1d8b294476e38c5003d5eb1c1c5b10d02eea41514f5a5c19f4ef70d43
-
SHA512
fdde13e365125559e8f8b79be970532761d58cd59b5e52ab0aee95036381fc52d936ea8069151feb91b0f85cf5b1aeffa9dce8c1ea902e83b694c625aae99e75
-
SSDEEP
24576:8fobO/FhLa/N0KOHeYtajfKoTjelAcyfkSKYBlbAXP/bHnH:nbO/HL8NZOHHtWSwjelADHTM//bHH
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3468-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3468-8-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3468 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe 3468 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe 3468 3646c39f58e5e1352d227e8ac2e90f9b_JaffaCakes118.exe