Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2e0860ed006e34934884867649c07e21_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e0860ed006e34934884867649c07e21_JaffaCakes118.exe
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
2e0860ed006e34934884867649c07e21_JaffaCakes118.exe
-
Size
15KB
-
MD5
2e0860ed006e34934884867649c07e21
-
SHA1
a3e2ed3cdf9006c870cde494783e730d6f6cc8a8
-
SHA256
e761cd211dc28d425509ef19414e3e2094af7492fcaaaee152ef4d244b4b6410
-
SHA512
910f83c1a5b30782b589bf28acb4b82535e0ef9b821ce9f817ac91de5a89ff6c08b138bc5416b2213093cca3fdb51cbbc973a619c1d36c467fa5dba8eaed642e
-
SSDEEP
192:ns0griBipoLzYGqfz5P+V8o8PVCpiQySTsMsm66rdZuYFRVT6QjcWQHToQ7c:CxpAzzq9PhQ/TsMLfuCVT6AzyTd
Score
1/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 2e0860ed006e34934884867649c07e21_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1240 2388 2e0860ed006e34934884867649c07e21_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2e0860ed006e34934884867649c07e21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e0860ed006e34934884867649c07e21_JaffaCakes118.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388
-