Analysis
-
max time kernel
141s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:59
Behavioral task
behavioral1
Sample
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
422b95ee16e4fcc521fb7e651dc5919b
-
SHA1
807b8412f04b292953961e58f0b3bb3e83114231
-
SHA256
49d3adc5061dd99252a61d67311e3ecd2c9685ccd376c8b76e463a4c7ac8c4a0
-
SHA512
5df810d07a6fc767c1d4251d4fc68e6e0d460f274db310dfef7dade073b64fb4917eb6eda9e139b6c01c2caca64ecaab0bf7f0822d869e6a945e3bbb183a983c
-
SSDEEP
49152:tfQ/dwE/gFc3g4cpv3ju8RopbJRG+2IYkPqtVP2d9OdjJY69pMC9TB:WwE/gF+g4A3jvkdROLMqbP2O2s2C9d
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2240-0-0x00000000010F0000-0x000000000168D000-memory.dmp upx behavioral1/memory/2240-315-0x00000000010F0000-0x000000000168D000-memory.dmp upx -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe"1⤵
- Checks processor information in registry
PID:2240
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5d81⤵PID:1728