Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 14:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe
-
Size
45KB
-
MD5
23f41e702c44e9eea598102879a61d47
-
SHA1
02b37a9f92252d92b973cbfab2b7d36d0d195ca8
-
SHA256
46954e8b7060d45116668effc05817bee1be68707a3af32d36dbb1a62f6da701
-
SHA512
8bf8843d2db145b4b21bf86ca5c4526315ae3c60d90753c1389a45e2001b55099efc163864c788c5377dd56b427eaf07fdf317da4be7eef105d246b02a1632c6
-
SSDEEP
768:NiOQauOECLIK8u4qc+5aIjK4LrP+K5fE67y7N8FdUV0MeExFt:Nip8JB5aOLL+K5E6U878Lt
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FAMEH32 = "C:\\Windows\\i4qv8iZbzH5r5G.exe" 23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\i4qv8iZbzH5r5G.exe 23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe File opened for modification C:\Windows\i4qv8iZbzH5r5G.exe 23f41e702c44e9eea598102879a61d47_JaffaCakes118.exe