Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe
-
Size
100KB
-
MD5
4225ba3915c787a17f9245dd57ef22ca
-
SHA1
6e4f1b8c94fbe9a61e8c679055211cc6cd846c42
-
SHA256
38916203af350e921b276dc7039ba655bc9858daaeffcfbb923794767ea959a6
-
SHA512
875969af87c12d023e1d974338c40aedbc34ad94d7ac82abcc3c380c711a9842b3439ed6c62575ddb35dff13b004a586af07cdf2310585df6030c1345bdacec2
-
SSDEEP
1536:hXpB5B6Sq1lpsvQRMIxo/aMtpSPOlXt+QZPgIUqyTVZ+inDGFbXFWgpuN:HBH6JavQuaMKW/25qyTzR+8ggN
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD51dd928e17cc9c9489ab4b5df6cba6576
SHA14c2610f9d4a94ae6d1ccfb5dcc6bd8aff41e4bce
SHA2562be646e50d94b38213c5f513a4f2e74a584b6669048b565a52cafd297a95c3a6
SHA512d5afe621c57ec9f026835975f9e25a942e8d73280b7aaac2352815f0499376005b433a406af8c9d52962da95a47fd407fc0aaab281c6654980307cc9dbd4bb0f