Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 08:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe
-
Size
160KB
-
MD5
5fd44db0b137c828dcd785bcd1003bb2
-
SHA1
90a796c27b00c5a67c19ea5ccf11cb15f447ee0a
-
SHA256
4e022856fd6b25afaa3953f24129e374ed076058557bf2154ed6de5d82cdf326
-
SHA512
a6386cd0f3ca8f8763f2b21c8e90fda856e754ff5079a0089fd651ac5d0f9f50a3d433ecfc9aecac4cfccf160e7ef09137bc92c49bf7e67f072cae480fe7c607
-
SSDEEP
3072:y45V8bF5MHkM22FyDD7XBNYdLP8zLW2ibzw/4L7YrKbjt3al/t+xDUuR5+:yzwkM22wf7xN0L0LW2Qw6YGbjhO+fA
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svcalg.exe 5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe File opened for modification C:\Windows\svcalg.exe 5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 5fd44db0b137c828dcd785bcd1003bb2_JaffaCakes118.exe