Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 14:59
Behavioral task
behavioral1
Sample
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
422b95ee16e4fcc521fb7e651dc5919b
-
SHA1
807b8412f04b292953961e58f0b3bb3e83114231
-
SHA256
49d3adc5061dd99252a61d67311e3ecd2c9685ccd376c8b76e463a4c7ac8c4a0
-
SHA512
5df810d07a6fc767c1d4251d4fc68e6e0d460f274db310dfef7dade073b64fb4917eb6eda9e139b6c01c2caca64ecaab0bf7f0822d869e6a945e3bbb183a983c
-
SSDEEP
49152:tfQ/dwE/gFc3g4cpv3ju8RopbJRG+2IYkPqtVP2d9OdjJY69pMC9TB:WwE/gF+g4A3jvkdROLMqbP2O2s2C9d
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4040-0-0x0000000000C60000-0x00000000011FD000-memory.dmp upx behavioral2/memory/4040-355-0x0000000000C60000-0x00000000011FD000-memory.dmp upx -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 422b95ee16e4fcc521fb7e651dc5919b_JaffaCakes118.exe