Analysis

  • max time kernel
    93s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 10:48

General

  • Target

    fa22d1069fae98542e08dac6e4eee689_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    fa22d1069fae98542e08dac6e4eee689

  • SHA1

    a9f5863ca7c71dfb24edcea42d1f725b8ee1afdf

  • SHA256

    04cee98dda3ad6a142537288106f7306c20ae2273542ded9e1eaf51947eb9d11

  • SHA512

    265416ffe213100d1658448c01181b08528db97c68b62e990d567bbcc01b1ee2e47397e200216482e585d9c342aa2fb78505dbe1c7f7464aa3df06c6b7ecbd56

  • SSDEEP

    24576:jgkPnXqTXd/juSyG0uHWm91TExakK021D0HHprQZ8V:jVOd9yG0u2c1VkK/F0r

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa22d1069fae98542e08dac6e4eee689_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa22d1069fae98542e08dac6e4eee689_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 1888
      2⤵
      • Program crash
      PID:4672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4472 -ip 4472
    1⤵
      PID:4320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads