Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 08:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
628e1d38b5427dba964dd53be24c054b
-
SHA1
3b44b0d90d156b8c089869f697d6cd9aeaf3d082
-
SHA256
c12d4875003c8790cf37999e9c8449314648e86b08319a4f26c271f853ce449d
-
SHA512
587ea6539e9054787647fe833f95cbc54e1882f515da6916673e53a2711927ea36f9f52175551371589e1f9f2ae533cab59e792b85246a97751ec4fbd4b61e49
-
SSDEEP
49152:nh8dEYpdANaZWwn+0c0EHGh8eBYI8kpbmhE88ZcMT:0ZAN1wn+LdH5eBfx1ZcMT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2768-3-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-12-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-14-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-34-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-32-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-29-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-10-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-8-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-6-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-4-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-2-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-1-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-42-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-45-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-40-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-38-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-36-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-30-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-26-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-24-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-22-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-20-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-18-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-16-0x0000000000840000-0x000000000087D000-memory.dmp upx behavioral1/memory/2768-47-0x0000000000840000-0x000000000087D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2768 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 2768 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2768 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 2768 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 2768 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe