Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 09:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe
-
Size
356KB
-
MD5
4dcca5f2945ac74b002ecba7597ac775
-
SHA1
d673376b3fbecb6b67c4f330dd4d96e18198f4aa
-
SHA256
cfb306283cf85729cd3bba5b50f4f1a5628bd6db4cac219ba8f32750f3e74a45
-
SHA512
22448cd86ae1f92d92e61aa815b4586f9c9bea0df6d49e27d71c5b10bb7650dac8319b626e926eaa619d482a84700571928c79e62e57630754aa33037582956d
-
SSDEEP
3072:Srz/92a98YQ19SeWhR6Nl7o1eYYQ19qROLz/9KwCZ63+kFVaiJ38yrjT:ML9IR3vZ1YRXL9YE3BauVP
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4856 4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4616 4856 4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe 84 PID 4856 wrote to memory of 4616 4856 4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe 84 PID 4856 wrote to memory of 4616 4856 4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dcca5f2945ac74b002ecba7597ac775_JaffaCakes118.exe" /SETUP2⤵PID:4616
-