Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe
-
Size
176KB
-
MD5
499d3e290fe97667c60bc029d46df4cc
-
SHA1
84ba250f0a274bac566c29335cad33c51867cb86
-
SHA256
cda8f3d4ee40a8988e4be48811e1525de2314a389478c49de80288f84fa98581
-
SHA512
eaa4c9b29d0ee7eed44ff2df244de6579dc76d61b4163342ae49ea6c46da52c2f4a6875500639061e8e9abeadafcc138d7d80566dce92003191ec7d271e528ce
-
SSDEEP
3072:bk9QVKg8Os7sAApABIEIm3RR5g3OOpG23fgYAnKZlowPwsba2KTs4Yc5d:A9QVKg8TEOaE93k3fgYiKYnNYc5d
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2540 499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\syskaka1.dll 499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysrunche1.exe 499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe 2540 499d3e290fe97667c60bc029d46df4cc_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5bf51f4d9b71ab5af6f2aec094f24a502
SHA17704aff58dc6da19947e582a3143df3c2279320b
SHA2562faf4ac7c79247f0583c51386d26416f37b6794c193dd94a38d25d46e630dc3d
SHA512fbee34ad9948b24f369514f2d758c309dbf0c50dd33172fdeb6ed393ad9a059f99fcfc41d9a1385844a53204fd3131cc60f47ac2c95ca8feabc2836d9564119b