Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:52
Behavioral task
behavioral1
Sample
65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exe
-
Size
376KB
-
MD5
65c27ef01dd7ebe584cf86071dd187f8
-
SHA1
4ac3979dd5b4fca7815211f5cef442edbc3ec0a3
-
SHA256
06c8c51c111466d5eb723fd3db49fe6b36c31f9cc123a6c6a9925d289d368a63
-
SHA512
96cddac79aa8f84c80a0c78ccaadbf06c7029f2d9ef051b25f9fe288185f079e077d01be1a9033b0ec5a87d7aac6d15c68bc9b73b78041815e0d37fdea6e3732
-
SSDEEP
6144:I2sV45DNQ6IOeIX7rL3D0YolEfx/nhekS/DQuAEGce+2Tv+ZmHm6R3YIm:V5DuKt73DpoAxPhen0kxcv+ZmHm6R3fm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2064-0-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-4-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-5-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-6-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-8-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-9-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-10-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-11-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-12-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-13-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-14-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-15-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-16-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-17-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2064-18-0x0000000000400000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exepid process 2064 65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exe 2064 65c27ef01dd7ebe584cf86071dd187f8_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2064-0-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-1-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/2064-4-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-5-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-6-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-7-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/2064-8-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-9-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-10-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-11-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-12-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-13-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-14-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-15-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-16-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-17-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB
-
memory/2064-18-0x0000000000400000-0x0000000000510000-memory.dmpFilesize
1.1MB