Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 01:20
Behavioral task
behavioral1
Sample
4c38c349170fa2ef93f0901cac7fdb6c_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c38c349170fa2ef93f0901cac7fdb6c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4c38c349170fa2ef93f0901cac7fdb6c_JaffaCakes118.exe
-
Size
674KB
-
MD5
4c38c349170fa2ef93f0901cac7fdb6c
-
SHA1
f65826f7bf74b3b4645746d8f4f64eadf22d8456
-
SHA256
db5220d3e4b75497b21b5b694eb0e07e2539228e2c139932dbba3e5a8e9ac5c5
-
SHA512
d45ff38dd617ffbf623104702f7c6ccdde3afbdbc96c5eaa80008870b3e245d6e0dc83391b38b1015603280318af6d07e11b301d20929a000475d2a0bbb72f43
-
SSDEEP
12288:Y4RIuUexGHGUjRMFW9G6nMTQ8Un8M+LVnRvE9Frgn4RmVE5OlnSoOkWTR4R4yYrP:Y4SuUmQGUqWbnyQNn8MGV34gVBlSoOkw
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2652-17-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2652-23-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2652-26-0x0000000000400000-0x0000000000579000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 4c38c349170fa2ef93f0901cac7fdb6c_JaffaCakes118.exe