Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 12:12
Behavioral task
behavioral1
Sample
45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe
-
Size
290KB
-
MD5
45c2f39aa4bb5b88dfa997e55a6f4dd7
-
SHA1
713d71ca9a99b9e14fdc31527dd03151deb0a3ab
-
SHA256
b93fe2d061d574e64e459814ad0b689a9ca2549325dc2c4e125823dd2922fda5
-
SHA512
1523bd72b71a536a5d9d31fd7f3dbc4fd9ebbc2724b0278b6ec11034fbffc664e1cc7cfa6dc0cb40678cad42203579622fea3a89bf2c7e99c53184ce4d68c79f
-
SSDEEP
6144:MVDIykF3mQt0fZv9YC5fn+aCyIK3ccnMxj6YClOa:MhedmUWY2W1K3DnsZCc
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3356 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3356 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe 3356 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe 3356 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe 3356 45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3820 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45c2f39aa4bb5b88dfa997e55a6f4dd7_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x41c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3820