Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 09:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
5fd7deb88ef845711c6e7fe0e550aa9e
-
SHA1
1a6e86c42ae5e18345e34f6fb86db87c136abfef
-
SHA256
7816a825c08c36c05ab3f897ca3d447f9ebdf40b07bcd049213c0ea3eb436a82
-
SHA512
015c21b225f5880e3e3befcc177db755a1716f25aab25b5f1e712530b29c0b791788981d7967609bb0be3e84dbbe659d0a12c9cdfc41b1670e29f9e3734bf816
-
SSDEEP
49152:qSU2Mi7sfIMEdcx5ONiUKiGwoArY4eS1kPdwjRJY8qsAGKsuzPZEH+8+h9zvgpCK:/5gf5icxgNDKNh14f1ESqs1YWHEpwDak
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1128 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\DefaultIcon 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe,0" 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\play\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe \"%L\"" 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe \"%1\"" 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\play\command 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\play 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dm2 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dm2\ = "dm2file" 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\open\command 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm2file\shell\open 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1128 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe 1128 5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5fd7deb88ef845711c6e7fe0e550aa9e_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1128