Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
f76ec9a877305bb2be1c1a5fdf1f93b6_JaffaCakes118.lnk
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f76ec9a877305bb2be1c1a5fdf1f93b6_JaffaCakes118.lnk
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
f76ec9a877305bb2be1c1a5fdf1f93b6_JaffaCakes118.lnk
-
Size
1KB
-
MD5
f76ec9a877305bb2be1c1a5fdf1f93b6
-
SHA1
8bb2b0e21eb8a28aa84edd7d1b0166b8f94b8974
-
SHA256
d7cce93c4b8fe8857cfe0b13d8e36b88935fa408248c51b2af818f81ad74c283
-
SHA512
1c46b10c58fcffbdc0220b1b80b6e3fd8c7e1801fd36765cbd237b0292b6cd91a2faf436ed475d623482675c1ce700a938815dcc7797b04cf19fc18cba0c96c3
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1184 cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f76ec9a877305bb2be1c1a5fdf1f93b6_JaffaCakes118.lnk1⤵
- Suspicious use of FindShellTrayWindow
PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5980 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3048