Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 23:45
Behavioral task
behavioral1
Sample
3f59146d2f565f46dac1c311bc8d5e5a_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f59146d2f565f46dac1c311bc8d5e5a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3f59146d2f565f46dac1c311bc8d5e5a_JaffaCakes118.exe
-
Size
9KB
-
MD5
3f59146d2f565f46dac1c311bc8d5e5a
-
SHA1
bc75b4623451eb90ca6dc8befe96c0665ac2706a
-
SHA256
3af7b7a2e21a7e56532a430fe71a6b645bfc34023de877f2cd1984afa1419776
-
SHA512
91bc0b295187c2f4931897db456a7c8b419b2da349edbcf75182fcecd55e439b3900115008bffe66a61b712a32d97bb9a26b6386bb2260160841fcd1d7cc4693
-
SSDEEP
192:cH/eENLrcAn5PnrfqX2igr/r/BgR8QRN0FQwWUQ:DKrP5f7o2igrzpgR8W0OwWUQ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2500-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2500-3-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 3f59146d2f565f46dac1c311bc8d5e5a_JaffaCakes118.exe