Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 09:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe
-
Size
108KB
-
MD5
5b52340b4c5e5d476eab844a37101ceb
-
SHA1
9820c3281860fabb356a84ffa0a25b7c090abaa7
-
SHA256
59ab93f27bff623bbad94340f8a70e580efe50dca032c68095503f967f018c9b
-
SHA512
76d6f23e08d92882db7b41f582ee8589ad29b76800c4cb69a7f606acde7addaf8a83b5297041987a67bf23566ec4ac06f9e0b2e2fea24dc3714774c6d4f32ded
-
SSDEEP
3072:GZ9kyZ9AqXopWQQ2GM9w2EA8+mDnCVf9NTyVDwlHZc5D:GZ9kyZ9AqXopWQQH8w5Ah8nCVf9NTyVr
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30 PID 2556 wrote to memory of 1816 2556 5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\5b52340b4c5e5d476eab844a37101ceb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5b52340b4c5e5d476eab844a37101ceb_JaffaCakes1182⤵PID:1816
-