Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 05:36
Behavioral task
behavioral1
Sample
44854978f82d6cc3bc85a982b99fb661_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
44854978f82d6cc3bc85a982b99fb661_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
44854978f82d6cc3bc85a982b99fb661_JaffaCakes118.exe
-
Size
92KB
-
MD5
44854978f82d6cc3bc85a982b99fb661
-
SHA1
1def3b40fd1842801d3b07cf3ebdcdf86997c171
-
SHA256
6a80bcd922b8f4a837b95bd53837b8eb8f7568519744ae9b90c32237b1fffcdc
-
SHA512
7dbe88a85195d32409413c306d0e530bd3d1679a182d4c86384c79ce2a2d23ab57bc8bd6c2bf4e29fffc2efbb943a4a124dc82d4186a88322bc663023964daa3
-
SSDEEP
1536:OH6DyW4Xn6yORAUSbcpFsQfSMbv7WzqGP8Y+ggZHiBqmDOnwgZ:OHJT36yORA/cTvfPv7WzJP/+gPBqm6wW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2452-3-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 44854978f82d6cc3bc85a982b99fb661_JaffaCakes118.exe