Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 21:03
Behavioral task
behavioral1
Sample
fb293140ccb475b3561fc23fa8b720b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb293140ccb475b3561fc23fa8b720b0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb293140ccb475b3561fc23fa8b720b0_JaffaCakes118.exe
-
Size
93KB
-
MD5
fb293140ccb475b3561fc23fa8b720b0
-
SHA1
45c18de528bc2166de4e8c6cb0f43cc1567ca4e5
-
SHA256
6b5df6fb2d4f4120c06ffddb521eba424f2aa49cc810c6bcab6fd5193212a6c2
-
SHA512
18cdfaf35327a3e0de826d531a3e6044dbcae2bdd46dea2bfa165d2265d01d70dd68ceaf41ed6f806dc09d219f0799e776f40565c20c098650fc3942a36156e8
-
SSDEEP
1536:uGaD594Fvs6I0qThQeRKKGCMXMZg6Pq62Qowv1kB9BmlrzXzGQ5PvXQJTnc4+i+I:WD5u/jqTqeNGRmH2mx75nUzZ+i+hPngF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4844-0-0x00000000000D0000-0x0000000000119000-memory.dmp upx behavioral2/memory/4844-1-0x00000000000D0000-0x0000000000119000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\75756c6b6b7b6e307b667b = "C:\\Users\\Admin\\AppData\\Roaming\\uuep.exe" fb293140ccb475b3561fc23fa8b720b0_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4844 fb293140ccb475b3561fc23fa8b720b0_JaffaCakes118.exe