Analysis
-
max time kernel
140s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 22:47
Behavioral task
behavioral1
Sample
03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe
-
Size
361KB
-
MD5
03cd2f2a69f0a2320ea27d858375e1ee
-
SHA1
9741049b95bf467d21dbdb7168a1e34aaf75d026
-
SHA256
f5c9649d87198e5d6161bf3dd17a5c0bac6df082e6fb8519ea3d3d1b3df01bc7
-
SHA512
81971b7501687111350619b3be47761161cc02f6ac77161cfb083f8351a4da145f9e80eea6972950a63ff352a78bf6467b903a33dd751cacd9592b6285cfffe4
-
SSDEEP
6144:N/vOM65ERltmlY424i31rZzd6ifcDjgftcWz808aBqpTnRQzbreoS28w:NHOrChB5/6ifusz8kqp9QzbqoSI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3472-0-0x0000000000400000-0x0000000000512000-memory.dmp upx behavioral2/memory/3472-9-0x0000000000400000-0x0000000000512000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3472 03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe 3472 03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe 3472 03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe 3472 03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871B
MD5f78320f8345aa0dd08e41f539d0ef50c
SHA1a8b5f3a8fca0ebd1e715e20f908a210b66e281ab
SHA25677bd64fad57a4fa696f6c2aad9e52cf17c4d007e584668eccf3f578bd74a24a4
SHA5128ca0e5d354b1e5117e05b4def2aa47daeffa40a04f337d53220358c77acf00a01dae3753e734e33b8160d5d92c84b14df8614cad1a99094f0ef60b6ddc4c5a2d