Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 11:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45ac4a421b1178fea2dc4998b227e188_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
45ac4a421b1178fea2dc4998b227e188_JaffaCakes118.exe
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
45ac4a421b1178fea2dc4998b227e188_JaffaCakes118.exe
-
Size
613KB
-
MD5
45ac4a421b1178fea2dc4998b227e188
-
SHA1
19a2007e051a63914d66fb44dd0548a27cc545d9
-
SHA256
6268c6be67c5aa2ddfdfe7402464db02597527a6c2aff9f0507f07827d69cfe5
-
SHA512
d616e2cfbc863a2e824a30a4994a2cf6c5e4295b8f68edfa479cafbcb879edb2b39b946578502d88072674b8c6b6b16ba61528ad1027b566f39e9e0ed12d156e
-
SSDEEP
12288:UZfh72VKNXHMFf/V1nUS0XEg5SGhAxv0yXkPu09llizdiJXFB6bYrZ7P:W7uKNXsFfHUBJIGPE6llizdyzpt7P
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1604-8-0x0000000000400000-0x000000000051D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 45ac4a421b1178fea2dc4998b227e188_JaffaCakes118.exe