Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 18:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
60f8968040a211550a5662ddbecd03f8_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
60f8968040a211550a5662ddbecd03f8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
60f8968040a211550a5662ddbecd03f8_JaffaCakes118.exe
-
Size
16KB
-
MD5
60f8968040a211550a5662ddbecd03f8
-
SHA1
5a7039e8e4968c15a08006019854ff585bb1dac2
-
SHA256
66258b1884681a7db40e93301845d2b10dd6ef85943cef2714da7201926833f8
-
SHA512
59d458b13126708ca180b5cb3827cfb5edf8e8fffd3f4a9e2523a3108afd3aa71a278b011fbd2c6f988a094ef3e670b38dd894ecdff1570b78bee6859dfbc475
-
SSDEEP
384:JAm47nZHM/yP9Pcp3pa9FLS30hQhi6t/1dzy5N7Jv2GwmuD:JA37p9PGLa56Vy5NVv2x
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1580-0-0x0000000007000000-0x000000000700B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\kdmiwa919k = "C:\\Users\\Admin\\kdmiwa919k.exe" 60f8968040a211550a5662ddbecd03f8_JaffaCakes118.exe