Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
447b8c5cbda0fbb25a50889d6c18c4da_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
447b8c5cbda0fbb25a50889d6c18c4da_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
447b8c5cbda0fbb25a50889d6c18c4da_JaffaCakes118.exe
-
Size
124KB
-
MD5
447b8c5cbda0fbb25a50889d6c18c4da
-
SHA1
ea51f4e0b125369cf1c7298f04b63383c096a38a
-
SHA256
ae47d37a60801c0a76e5df7eeb6ed0c40324c191672f774ea6f3f9466a4c36ca
-
SHA512
2baf84538e435519d3b5d465f27667fa0cdb1bb910e5313d62309d13df6175832f3e77887e5057b6244c9efd206aefed9e0673396f7935cb20dcdc6152b9f937
-
SSDEEP
1536:LGtxJ8C/PuG/QoVQLqDzDn1+pyEVHaIHuHi+vdvdodja:67/pgoD14Z4OG
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1O_SblqJqLl0nmhlqqeY8qBh1yQ4utTDY
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
resource yara_rule behavioral2/memory/4604-2-0x00000000022B0000-0x00000000022BB000-memory.dmp family_guloader -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 447b8c5cbda0fbb25a50889d6c18c4da_JaffaCakes118.exe