Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 15:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a034963ac15200826836b87f1e9bb2d_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a034963ac15200826836b87f1e9bb2d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0a034963ac15200826836b87f1e9bb2d_JaffaCakes118.exe
-
Size
652KB
-
MD5
0a034963ac15200826836b87f1e9bb2d
-
SHA1
07821314aa34fab2a1a2acc13fe1e1c8a61afbec
-
SHA256
9fb28d88832f7994ad86b1bb1ffb0e097d3e04afb20e950762ec979759b20dbc
-
SHA512
82e9637221775d9215d31947ba22c641b2bc5d581a0bcdb06f8f1747886e08babda49f5901ff97b84d273f666a393c78f4880d80a65ed54e1125b643efa28e8a
-
SSDEEP
12288:/iLw74z3Dw1fmsD1WtWrVn8aKH6/cmEr5/mpgXiTFIpuG2l69m8ZvF0aEghF:N8z3Dw56WarHbr5VihsuG+8ZNZZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2360-1-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2360-4-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral1/memory/2360-8-0x0000000000400000-0x00000000004CC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\7Vn3VRss\\7Vn3VRss.exe" 0a034963ac15200826836b87f1e9bb2d_JaffaCakes118.exe