Analysis
-
max time kernel
141s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 01:12
Behavioral task
behavioral1
Sample
f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe
-
Size
60KB
-
MD5
f4baf7a95b93cfa473be4923ecd6531b
-
SHA1
e795f2439ed0c59cdfa3435d0d1f3aed058dad07
-
SHA256
52668093574b7fb682f0868ae842727205635461e83bc90785421b38bd801368
-
SHA512
7111d60b9bdf33672855d28848abda29ad8918a2a9f885f81f8670c1f5ec35c4c7e2889dae24b4e0865a2f5ae996de615c87508a0ec94cdab1655d239b9ed39d
-
SSDEEP
1536:2r712AXY/8kFS12IgconIKV+JMppgR4vXKlMM2:2cGYRFS12ItVKV+JMppgeMMM2
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4092-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4092-4-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bj.txt f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe File created C:\Windows\tj.txt f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Software\Microsoft\Internet Explorer\IESettingSync f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4092 f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe 4092 f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4092 f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe 4092 f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe 4092 f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4baf7a95b93cfa473be4923ecd6531b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4092