Analysis
-
max time kernel
141s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 11:08
Behavioral task
behavioral1
Sample
a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe
Resource
win7-20240611-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe
-
Size
981KB
-
MD5
a53844e0a9f8c51baf3324fc6c821585
-
SHA1
087aa1be36d016a1f1e0ebdb91780ecfa45d97c9
-
SHA256
304b384d9e2f4fb244522d70ae38c064f1c7a32b58432b7d2279d94567aa5374
-
SHA512
7bf29ec36da28c557a6d654dfadc023a657394295ab35e163d5d36ba23aedacd8f5731f4d8d8dfa97c4158f4f99ba6beb745d032c3ea45876d078895cb172673
-
SSDEEP
24576:GElMUtmil8rEAoDz9JORoQbtbdtqtjh/sOLWMyPmHY8MfwOUBp:GElEZ1oDzAoQNSJLWHu48ROUBp
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2520-0-0x0000000000400000-0x0000000000782000-memory.dmp upx behavioral2/memory/2520-2-0x0000000000400000-0x0000000000782000-memory.dmp upx behavioral2/memory/2520-3-0x0000000000400000-0x0000000000782000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\7e85bbd6b1zec87 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe = "11001" a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe 2520 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2520 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe 2520 a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a53844e0a9f8c51baf3324fc6c821585_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2520