Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 08:32
Behavioral task
behavioral1
Sample
628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
628502a9d6691508d2c7863dc3dae739
-
SHA1
f0bf4a4ac226ca819d96a595089f2933f63a2dbe
-
SHA256
71b0d904888585968e0de68863bab5277b1cb609c93d7afe12598c006d334fcc
-
SHA512
7209a31757ce8b7de6251a5c180b0605764c5b5a15743262dc6b269aa6fcf791ec3516e3eb3b041cca65c657f127920d92dcbd6de46072c76286d7423fbfb7cb
-
SSDEEP
98304:itnHOTl1Z9VCL+P4WM7Arj4sxNWmOzSW2pfrLCpyeuM7TXqQG6HgFqTpn:wqB9sL+NM7gMsHW1zSDCp5R/aQGRFkpn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2548-3-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-4-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-5-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-6-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-7-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-8-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-9-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-10-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-11-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-12-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-13-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-14-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-15-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-16-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-18-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-19-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-20-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-21-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-22-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-23-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-24-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-25-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-26-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-27-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-28-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-29-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-30-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-31-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-32-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-33-0x0000000000400000-0x000000000131C000-memory.dmp themida behavioral1/memory/2548-34-0x0000000000400000-0x000000000131C000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Arquivos de programas\\WindowsUpdate.scr" 628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\628502a9d6691508d2c7863dc3dae739_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2548