Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 18:41
Behavioral task
behavioral1
Sample
5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe
-
Size
486KB
-
MD5
5d303f6e2cd19b6931abb145bc02a939
-
SHA1
7136c3dbcc36f1ea1f610c9973a0e1cdc90a1544
-
SHA256
22dfc7d2583fb5a70dfcb26e751336f26c4fdfc7632fb8c02f351f8f07ef55ad
-
SHA512
fb607ead83517935249512e384cb5d273b0366446157fc6c78561eb08e40cec9d101e33d0b6de387f03f5dc18a897c7a99f706c7a5370359dc9586406e8d4cc6
-
SSDEEP
6144:yS5yI7Tw9s5ovJNAa1aXK2EFrUCGvRWZzwXxS33T+WK4y/ae+RSm:ymTw92oQArm8TvK4y/aX
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1984 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe 1984 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1984 5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d303f6e2cd19b6931abb145bc02a939_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1984