Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 13:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe
-
Size
455KB
-
MD5
08e3c3ecc51953f345399be107438d5b
-
SHA1
f884598933dc092ce1680dd340f92622c7334a78
-
SHA256
0bfb3a97357c16608d5f00c0ec588ba2ea5228944e923452ba0f8d6b18b244f7
-
SHA512
b3ec1d38304a22fca910a6354e95746b40bca711ec6e4ed23010d448db6fce188fba10985b8ec3d59cbe24cd8230d97c9937e985136bb4c8fa46d4d00b78b8b4
-
SSDEEP
12288:HR+jSwGxzbNW2vA5JU3cqikzbQc54u8Rf+eWp0XsSyj:HgqxzbNW2vAA3aScc4u8UHp08
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe" 08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1888 08e3c3ecc51953f345399be107438d5b_JaffaCakes118.exe