Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 19:57
Behavioral task
behavioral1
Sample
5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe
-
Size
192KB
-
MD5
5d73e217f4563f49d2d22ffd5f7c30ce
-
SHA1
0ccc8c43f6116a43b4e0930615ae5e7f04e3bc58
-
SHA256
98c5c02414bec284acf65ac037e3c4b770546e80366edf6b080d7b5829446f57
-
SHA512
85a1f6c1a94f0b11ab6f0b90be3bbf1576f18a749d4fb5ce462d5e0b43700f71b299adec4d3841c6f13b30dec17f41b4ca0f0f61054d98e51272975f753bc49b
-
SSDEEP
6144:kM2tYgc5Zpg8uJ/mjWvRB4ospCbLxJdIIG:CI5T7wRS5pwXd3G
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2264-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2264-1-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2264-3-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2264-7-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process PID 2264 set thread context of 0 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process PID 2264 wrote to memory of 0 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe PID 2264 wrote to memory of 0 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe PID 2264 wrote to memory of 0 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe PID 2264 wrote to memory of 0 2264 5d73e217f4563f49d2d22ffd5f7c30ce_JaffaCakes118.exe