Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
edf05d56282a9c94772d5038fe1768bd
-
SHA1
f55176e383892099ff1b9158029c5275cf2a0256
-
SHA256
e9c26344efd1bae0f5ea2ae62a9b51986724b574197da390adff0e41efacbf88
-
SHA512
79b3cca042d865a080b42995837f95b5edf127186f1df8029fc30d498e51321e326e5b1bed86ad745e5855cb08dc9dc90c15b9fcd8dd9db58becbe5b1b658b62
-
SSDEEP
24576:h9LYuehbBjFA8gtf5yjA6nlQxfyNmOvexD/TFiELDj1q+K/9oJi8Sx9:bLEVWhMA6lGfyJvUTFbLDj1+9oJNSx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.MyNSHandler\Clsid edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.MyNSHandler\Clsid\ = "{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC} edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32 edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.MyNSHandler edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.MyNSHandler\ = "this is my ebook" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID\ = "edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.MyNSHandler" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ = "this is my ebook" edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2980 edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe 2980 edf05d56282a9c94772d5038fe1768bd_JaffaCakes118.exe