Analysis
-
max time kernel
141s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:12
Behavioral task
behavioral1
Sample
f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
5 signatures
150 seconds
General
-
Target
f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe
-
Size
623KB
-
MD5
f60fbf499b2b88a159fab706851188c7
-
SHA1
0a7932a06e6915286c14b8088f663e54fc96175b
-
SHA256
859db82997bdc6452e6b4c59ac659516c2f0ee11cc3dc120978d90d4714023c7
-
SHA512
48f203b208330844af09973715813449eb8243f36eca175252886c9a5812d3e7bae590753cbe305cf2f6a9e885b5473d159104e55972c0cbeedb56f705fa7b69
-
SSDEEP
12288:yKTO4gJ4RK5OZrpBVHpNbbsHregfIoN7yBgxehSba9QbWSPl6:yKTOLMZlBVXsHHP7XGalk
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/60-0-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral2/memory/60-32-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\IESettingSync f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe 60 f60fbf499b2b88a159fab706851188c7_JaffaCakes118.exe