Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 19:06
Behavioral task
behavioral1
Sample
a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe
-
Size
14KB
-
MD5
a7db674aa02c69b16f0cb423f2033f84
-
SHA1
5fc0b44923bd507541aba74b5ff71e76270019a2
-
SHA256
d3e583bf9ac7cbd7a18ff60da7be09e9dfad4e07ed68ec168732f92165cd648f
-
SHA512
928aae4a5143dd49c041e1033dfa4e47e4d5d8928f21baeadcd7f9074e226c8d2b8ab92281acc247316580e2e1f39c184eded6b007c0196b7e59b1c58083828b
-
SSDEEP
48:yZHh99KETiNA3J7FBEp/kJQr7veso3LVloRYPCXCl8P5qSeJY8JTa5G7SB:AtY/uQH2syLHLiPzG7S
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1620-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1620-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\jdgf894jrghoiiskd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe" a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jdgf894jrghoiiskd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe" a7db674aa02c69b16f0cb423f2033f84_JaffaCakes118.exe