Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 08:41
Behavioral task
behavioral1
Sample
8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
8d7cc538c8f08179e6733eb3ec8aa1ae
-
SHA1
e5a5ecc6040784cec46e5d6060e68a64e4100c14
-
SHA256
24c822a0709556986971b29144bd81d918d66d68d89226aa880e7404c72aa98f
-
SHA512
26fc251929abfb8ac916ed30d6f2fb5b39aeb2c952538e47acc2f712e61d9c43da59e09ae5ae43036af155e42e03aae32a9ddea14f7bcef139964dad5fb2de0f
-
SSDEEP
24576:WjZxcE3XJ4o32EV09C0JM1s7pku6w49R/zqe3Gm+XJlroJkO3uvSseNVnEQy29:WjbVJz32/o0JM1Sku6w49RWeWmeJyJCw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-2-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-3-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-4-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-22-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-23-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-24-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-25-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-26-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-27-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-28-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-29-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-30-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-31-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-32-0x0000000000400000-0x000000000088E000-memory.dmp upx behavioral1/memory/2936-33-0x0000000000400000-0x000000000088E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main 8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2936 8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2936 8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe 2936 8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8d7cc538c8f08179e6733eb3ec8aa1ae_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2936