Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:59
Behavioral task
behavioral1
Sample
bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe
-
Size
432KB
-
MD5
bcccd9ae8bc0b0b18d31f8ef6953cd64
-
SHA1
255c6a76eb3e229036ec6e5c7dc6b7193bc7d6f9
-
SHA256
dcde4ae0d37ce02d19a420afedb4e30267c9f727a4b32ac9d0345b630917f34e
-
SHA512
572994b805163be8c69b2987d7f710787bd4ef3cac69786a90da5785125fee62a1978ff24590556b5b89a6b4e9d65dd888347523991e9cd050fc374c9b72bb93
-
SSDEEP
12288:3X8XvwOSxtYrCsJbUxAuBedVry/zg9ze1ZvYLOltUX:3Qwf8rJ4BBwtybg9zspCjX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1812 bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000015fa3-2.dat upx behavioral1/memory/1812-4-0x0000000010000000-0x000000001012B000-memory.dmp upx behavioral1/memory/1812-7-0x0000000010000000-0x000000001012B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 bcccd9ae8bc0b0b18d31f8ef6953cd64_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5d423ddb46deda1475185f29b3e195d4e
SHA15907017252c3e94e40db41d16d6a92cc466e4b05
SHA2567f6baf772bf5cc8280a956019c2009e17c96c93995af6abd9580dad800579872
SHA51274ba8a82da14d25ce87ea440c67834d72b414baee355d56730c902a7543880efc8ca866ec138c4b4a2780fdacfbcb7a9030fb9a990ac851f777140361cb3f153