Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3eb6fff9479f3e1d228131a14102b124_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3eb6fff9479f3e1d228131a14102b124_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
3eb6fff9479f3e1d228131a14102b124_JaffaCakes118.exe
-
Size
16KB
-
MD5
3eb6fff9479f3e1d228131a14102b124
-
SHA1
4ca92e9fce806252a7161200063e2ecc35714783
-
SHA256
2d79d8a518856b6fc8ee5ba1311c782684f82a00f824056aae6730ee2e0d0557
-
SHA512
8083e0220297899d47ec8fba30793dcaa5f5a5f9f17d67a59a6793fef4d029fd0bd6786532b3ac81e1ebd888107f3967d80f72974314e47e7330987efb9949ed
-
SSDEEP
192:fJbploEPcjPv72MroCJj2F2FZkPD5aOuK+k/eb/SkHkur8dojJv0JhuXS4K:hVloE0/VrTJjhLkPIOx/ejSO/8olMn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2236-2-0x0000000007000000-0x000000000700A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7z4u1v4b42 = "C:\\Users\\Admin\\7z4u1v4b42.exe" 3eb6fff9479f3e1d228131a14102b124_JaffaCakes118.exe