Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 10:14
Behavioral task
behavioral1
Sample
ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
ed2dc7085eda8a1c5757e19aa2b9897c
-
SHA1
4e7a4f2dda2eb8b24400eb2ed20a7c3708d96f41
-
SHA256
5355646eb9a218d90217a6ac5cd6f3e29f498602e98f51557924612c0be7f6eb
-
SHA512
0c221a706398dbd0df0c874eac0bed7e8aba2647aaedba462959e0f7b5c822c0f03575e52e29e017999ca9723c10db5f4d20ff410c2b9428bd6cabe04b5eb35a
-
SSDEEP
24576:uiCciksUc6OeJxvZavIDfMfxzBERSJtv6zMqBZqqFg4yBIuuxU32WnSn:9CcikP5FxvZavIDyxziR8SzMU3g4yeZF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1512-0-0x0000000000400000-0x0000000000678000-memory.dmp upx behavioral2/memory/1512-23-0x0000000000400000-0x0000000000678000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\IESettingSync ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1512 ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe 1512 ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe 1512 ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe 1512 ed2dc7085eda8a1c5757e19aa2b9897c_JaffaCakes118.exe