Analysis
-
max time kernel
120s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe
-
Size
48KB
-
MD5
190c9966b8d962ab1aeb8bbdeb544d55
-
SHA1
2eccb342ca2b6b5bb9b4b5329e8acb3aee3f9796
-
SHA256
c43e8d77fb666364ee099eff17eaf2a419d2500d319cfcbc9ef0f744fa9757a3
-
SHA512
18165e3e5da7cb727eea04d61cec56b66d45bc0a3544f6c0f293a88b975a46d64b7b4fda30bf436170898a98ecfdc00143369653a4d4a02abe4e2bdaa38c3b46
-
SSDEEP
768:r8vUwMzcvQl360N04/6jkdZyBwFeGtyaW/6aWnCtE/JkDFhJ2ysCLaILe5aQ:r0Uw0CQlJN/dZDjFW/PmCm/JCNsCLaO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3064 190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe 3064 190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe 3064 190c9966b8d962ab1aeb8bbdeb544d55_JaffaCakes118.exe