Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 19:55
Behavioral task
behavioral1
Sample
4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe
Resource
win7-20240705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe
-
Size
7KB
-
MD5
4b2a8d78a4b276cbfeb76bece29d460c
-
SHA1
d6bb7ae73df59e6c13434fbe30aa421e857293de
-
SHA256
fc9d900cc799ff9e3325f28343e9626318011b0ad997182202f17b9ee28361d3
-
SHA512
daea067a125da21d0338954d7328bf58fd0206a7f264be9b4130f76eed8e62beaec098a1a1a0253aded0dd5a9b3a4e1362eba984e8e6892a3078b5d90af3d6a7
-
SSDEEP
96:SvMKatRotYQsRMCCRGqMbIWh8ZqIbkPVdA3Xsmj3y/Fu3KUks:SELi/sWLRMsQNPfAvj3IFu35
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\this = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe" 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1904-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1904-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2096 1904 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2096 1904 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2096 1904 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe 31 PID 1904 wrote to memory of 2096 1904 4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b2a8d78a4b276cbfeb76bece29d460c_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2096
-