Analysis
-
max time kernel
150s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 19:20
Behavioral task
behavioral1
Sample
4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe
-
Size
484KB
-
MD5
4b0eb599e1079bdb142efce3e8eb0bb5
-
SHA1
a72dab5ef1b0292bd3ff824475cc1f37d6d56b11
-
SHA256
7d211c851af1009e9baeed94bae66573e691441a6ca25f9f6c778211337ec728
-
SHA512
5d8a08fddcab98970a40fa195bc265b837da76a3f1b5279ee7ea893ea6934e157806bdcf6ff59df6b7694495944cb0f24f544513345e17a907702cb35d711b23
-
SSDEEP
6144:RwGxcXflLSqGgN6D7tqbgiRKy8QCCksLYOu5sSGmn6g6q3PCD0GHVeZJZQPhaqnr:iGxGEgUntqbgZ5CnhG9nat0gmZQPH3F
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1768-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1768-72-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1768 4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe 1768 4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe 1768 4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe 1768 4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe 1768 4b0eb599e1079bdb142efce3e8eb0bb5_JaffaCakes118.exe