Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 08:40
Behavioral task
behavioral1
Sample
857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe
Resource
win7-20240729-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe
-
Size
16KB
-
MD5
857395c22c5bd4b707376b4cfc7c6308
-
SHA1
263349185213ccf520dbcd246f02fcc2d515bd6b
-
SHA256
c6204984759803b0498b654dc19e74e5d8791f398d98e3db290da1c89c832004
-
SHA512
1c63b6ab3b62bf8fc980d0f033fdf41a6fcac11334193cc100f70a79c196bf7135dc8ad0de9b94339c63a9beb65e9c8c05296ef420bd06ae2c48979f9e07f89e
-
SSDEEP
384:7t9+Xi9NVzGS7P9oDPlMNcLlb5sVKwyK5Ct:7t9+Xi9NkwclMNEyo
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1316 857395c22c5bd4b707376b4cfc7c6308_JaffaCakes118.exe