Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 05:52
Behavioral task
behavioral1
Sample
e95f97dd86cd2397c6e2bee35b5dbbf4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e95f97dd86cd2397c6e2bee35b5dbbf4_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e95f97dd86cd2397c6e2bee35b5dbbf4_JaffaCakes118.exe
-
Size
424KB
-
MD5
e95f97dd86cd2397c6e2bee35b5dbbf4
-
SHA1
021d4f929d9f3b622bc2673ea7e9663768728322
-
SHA256
904015e1441819f3744cdebc74fb6dcf8f6e8496627ac1d388b124213417f29e
-
SHA512
05c293b917008fd820789a7522891521295dfaee788516deaa1d27e3e6f17a48640bd95dcf1b1ba0845b77d148c973208e2e9ba6c40e82ca0bdc172eae6ea486
-
SSDEEP
12288:hUyHttWJpglh/UOIO/x8CqtdCizOvIzc2QDAqN/QKd8wT98:hTtkgll5n/iHfCxQzcxQrwZ8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3760-0-0x0000000000400000-0x000000000050E000-memory.dmp upx behavioral2/memory/3760-1-0x0000000000400000-0x000000000050E000-memory.dmp upx -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer e95f97dd86cd2397c6e2bee35b5dbbf4_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName e95f97dd86cd2397c6e2bee35b5dbbf4_JaffaCakes118.exe