Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 22:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe
-
Size
417KB
-
MD5
d52dbf52bc8e1de03c0d5f385ad452e5
-
SHA1
0e3bcf676954ebf650fb57c3367024eedc751e9d
-
SHA256
66dc7207e5826405c21953aca02b97e20b19b9b34f4f2f673321ef5b76ad1e28
-
SHA512
ec0ee8a5cad85c6a4d01537181dbfcb4633cd6fdb5a794bc0e492655583528e8d49c5543f2d7010d6f22271ec0cfee075b098d0ed5074bf1b5865ec9d75c7f56
-
SSDEEP
12288:T3ClbYuGxp2Nx+bj5JVnC04yOarNPT55HpBQFp:TSlbYuGxp2NSjnVnj5OaJPN5HIb
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\sdra64.exe," d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe 2648 d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe