Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
886a56b8797e7f4d4827d514240fb031_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
886a56b8797e7f4d4827d514240fb031_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
886a56b8797e7f4d4827d514240fb031_JaffaCakes118.exe
-
Size
4.8MB
-
MD5
886a56b8797e7f4d4827d514240fb031
-
SHA1
f8542f0b3fad3ad81e9b3125e0016402cf6bd443
-
SHA256
3464ada7756b0d86c23a4be5dd79653d3725aa77bd0376c352f47bcdc5d78d99
-
SHA512
8b215053418aa2e5e43b2f08490fc1dfa519deba34776b22be53b3be07bd4003b822cb8b6c553c9cae31d455eedc84cc3a866dae010e4fc8baeb5483e4a4863c
-
SSDEEP
98304:kQn4JI3qGf9eTq7wFE+poj14BfJ4i9GChW4jgEfxLyNfrN2xyI:jNf9eTqUi+6yBfJdh9gEfxQxcyI
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0009000000015a98-92.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 1440 886a56b8797e7f4d4827d514240fb031_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 886a56b8797e7f4d4827d514240fb031_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5179723f68097a5393d500fb0f6a1df80
SHA1b6be352431f1085cb8b4dce013aea0870b3f2ddf
SHA256486cd452e402432281f24666d36512c0d389e23df101690353d29ce22cc64700
SHA512c99b0d4179764968e3a607486b0bfe9617f4e7346abf1e435d56634bbd17296e64160b3df501fe39f49c6ba80891b6c16456e9c91b3a8541d9c9d2af8362713d