Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 06:04

General

  • Target

    331ac8b2c1a74f6a683dc17b7c7331af_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    331ac8b2c1a74f6a683dc17b7c7331af

  • SHA1

    36cf9b5a1e55eadc9d1ac1c10ccd4cd7299772aa

  • SHA256

    13a894195fa9920755d70260b4ec9388f07b9842d9950068cc9f4ba66f5f7ac2

  • SHA512

    01655fe0f0e6d3ec1f4d5b8ff7f26d6c73071e8a3de0cf1630f516d27a0f2db702c319aa818f0d577f2b6943fa8b0130688ffd07e5536fe59296c9fb55c0a586

  • SSDEEP

    24576:jgkPnXqTXd/juSyG0uHWm91TExakK021D0HHprQZ8j:jVOd9yG0u2c1VkK/F09

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\331ac8b2c1a74f6a683dc17b7c7331af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\331ac8b2c1a74f6a683dc17b7c7331af_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3224
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 1912
      2⤵
      • Program crash
      PID:1440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3224 -ip 3224
    1⤵
      PID:4876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads