Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 12:56
Behavioral task
behavioral1
Sample
29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe
-
Size
459KB
-
MD5
29fd98538352513258ce3e227557c0e8
-
SHA1
852f37b2eeed6245436a496d729b3aa7e5e14e68
-
SHA256
5c7e4b927889538272ab2f56bafa0cf9cd87973c3a388a1a9a7d2d11a0ee2071
-
SHA512
f240ec1c990fdf7ee3615e48d382e3d0422f7931e2febde458a01931d823e5335b7f2062fb705d233339df8df0ae5748032c0eede64ccf9cfd0df8c03931a8af
-
SSDEEP
12288:a3aOZZnaNk09pBKhWSzJmNoVqsd5yAi8YWeR+:a3aMZnSk09pCWSzvf4Ai8vU+
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe File created C:\Windows\system32\drivers\etc\hosts 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1196-0-0x0000000000990000-0x0000000000A34000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1196 29fd98538352513258ce3e227557c0e8_JaffaCakes118.exe