Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe
-
Size
39KB
-
MD5
4cd278e6a4537b57a4053fe98a5a45e0
-
SHA1
49c4c3dc88c95135f60479be6edb69a7e8a03564
-
SHA256
728daad7aaee0746beecb9100163056f63a63903178774c21be78c3a79c20872
-
SHA512
ddfe293b4a78d8c5628556517be5eab719cf5bc6718a5a2c40a53a2cceea013c1da065dfc1567030756e4f099e1037acbbc4203bd274d66f0ee11530e03baaca
-
SSDEEP
384:dkvQ0Vl0KqRmS6o7dotyyxMu8YpxoV1ueR2ghS3lkB+SCHGF3ZHWc93wZWB:a8X6ocyyxcV1ueRvGkB3j22
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard\Extension = ".vcf" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\ = "vCard File" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\" /vcard %1" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\ = "vcard_wab_auto_file" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\Content Type = "text/x-vcard" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\",1" 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wab 4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4cd278e6a4537b57a4053fe98a5a45e0_JaffaCakes118.exe"1⤵
- Modifies registry class
PID:380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3640