Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 15:20
Behavioral task
behavioral1
Sample
39ac4fb1f90016324f6adaef501d0da5_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
39ac4fb1f90016324f6adaef501d0da5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
39ac4fb1f90016324f6adaef501d0da5_JaffaCakes118.exe
-
Size
107KB
-
MD5
39ac4fb1f90016324f6adaef501d0da5
-
SHA1
e3327bce8c0f55f1e2e93640207eb0b414129538
-
SHA256
d59d153374c136883b79ee984cae99588e4934b268b1135dc4af0596eae93e2b
-
SHA512
4082559df4ac9e4b676bd605f1c2b9829d42e0146a839e817891e96437a0d58ec9d66bdaf93bdfb03d7d3704fbc725d15c66db2cf68a3807eefc85fa5f48c81f
-
SSDEEP
3072:5FUI3yaO4Qrv8QODXLFfoozQaEVse2HahCy:T9G4QGbFfo0QVse4ahC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/368-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/368-1-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 368 39ac4fb1f90016324f6adaef501d0da5_JaffaCakes118.exe