Analysis
-
max time kernel
131s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 14:25
Behavioral task
behavioral1
Sample
84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
F4_90-91_P845.doc
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
F4_90-91_P845.doc
Resource
win10v2004-20240508-en
General
-
Target
84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg
-
Size
103KB
-
MD5
84773231fe9827f0eab90fc85cf113ea
-
SHA1
ce3f3be8b74687abb009386fb5ad7b3138f808a7
-
SHA256
5665523cf573835a86d39d1dd7f0f7ae886530cafc7d60e8a66767630869e19f
-
SHA512
be849e1e69f1129ecbba804918920a6b63be24c4008f3fb978e4dabdb4032ed33f68931405db5b750020233c3f415441312425a114d26e3e458376e030089ccb
-
SSDEEP
768:V/+w6k3JZfubC7FLVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9OkDOsDPjb:Z731ZLocn1kp59gxBK85fBt+a9LdS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg1⤵
- Modifies registry class
PID:1020
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:792