Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 20:09
Behavioral task
behavioral1
Sample
fb13e37a7f7a9027d831eaac863fb453_JaffaCakes118.exe
Resource
win7-20240215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb13e37a7f7a9027d831eaac863fb453_JaffaCakes118.exe
Resource
win10v2004-20240412-en
2 signatures
150 seconds
General
-
Target
fb13e37a7f7a9027d831eaac863fb453_JaffaCakes118.exe
-
Size
44KB
-
MD5
fb13e37a7f7a9027d831eaac863fb453
-
SHA1
f6808161fb98d151543dbe2a0779a144a5b9553c
-
SHA256
3981fc51d56377c8fb0319fe598fc3e7d8e037b460a41a8b7237e071058ea745
-
SHA512
2b92834b39d5f97ad67441d0954cdd96fde3203e8671210c846b10045f1464ccf354e6b5a3565883c0a214137b5f890da9570f861d97e4a5d2c71ee894e2eb47
-
SSDEEP
768:7N+HOaMDsvEpSs50uNJ/lIAwPbE66FFT/87V7qqvk0HY1sP+n:SOaP0Su5IdbE66FFr8J7/P41sP+
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3944-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3944-1-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3944-10-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpData = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\fb13e37a7f7a9027d831eaac863fb453_JaffaCakes118.exe\" -hide" fb13e37a7f7a9027d831eaac863fb453_JaffaCakes118.exe