Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe
-
Size
495KB
-
MD5
168e1872ebb849d6523ca24c3a48019a
-
SHA1
4083773dd337dde4fe95596e30c401bb5c4ccf31
-
SHA256
860c9426ec428f9e1b4b0c5f4ecafbcd777c54b57712a2a11c306054623f3684
-
SHA512
3a7425d550b7d83613e0dc17f5264eb993b7232b66effd8d508d1131369089fcf0c76b858277e203a42bcbe4b255a9494f8722420379552a1747d29ab8c7c7c9
-
SSDEEP
6144:irPFRI6zSZ8DTtx1HhDF2idZecnl20lHRxp3gTncduD7yB9VCO6Sco4q8+dE6Cqx:iTFRnzSexThF3Z4mxxgDqVTVOC
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cydxrhserv.exe 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cydxrhserv.dat 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe File created C:\Windows\SysWOW64\cydxrhserv.exe 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe File created C:\Windows\SysWOW64\cydxrhserv.dat 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1180 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe 1180 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe 1180 168e1872ebb849d6523ca24c3a48019a_JaffaCakes118.exe