Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 18:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe
-
Size
10KB
-
MD5
5d344de5579c9595e6465d2c5c2c9591
-
SHA1
410270e755b9fa9f6dcf2029e620a5bda8b62252
-
SHA256
9cea78b2ddbb93a8b790f8ceca8ed46fd347986b14dfb4e723b213145e5df973
-
SHA512
ee3e0f9b8c0130736d306574eb873f0b2c61d953f829a7cee4292170fe5f9f6788b0b75e4a2d5922c1a3930a56df9449de44bb6c048a5aa02f89f1e1ed0b8957
-
SSDEEP
192:uTVyY/dNc3HrKplcfFa7gsixsHuFCOUv5B3:uTVZSHuplcfFDiuFHU3
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1192 5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe 1192 5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe 1192 5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe 1192 5d344de5579c9595e6465d2c5c2c9591_JaffaCakes118.exe