Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 01:56
Behavioral task
behavioral1
Sample
04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
04d0204c3e5a1e21a319f86850f5ba38
-
SHA1
c4f82442a384d1a7cd33761e1b7d298d81c6ec56
-
SHA256
470d56dbe228e72d7a790b03d5382aea442256378ca7e8f192e0373b6f865bef
-
SHA512
aaf3038d23e8e75148a1ec8147b98d333c6dd8b80498f6d86289501f1355cfbc640e286cefe64c4a3c3d58ae73b86a61f3b446fb783bad8c25b46f99bd56e2c8
-
SSDEEP
49152:SJRmR2xBcYJzi0itgeaO2oW8cQ9GP1rvNP0zsTWQ1PIPc:SJRm0xBcYJWYOhW8N9OZNsQTfZr
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\G: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\J: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\O: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\P: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\T: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\A: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\B: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\V: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\U: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\S: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\W: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\Z: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\K: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\M: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\L: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\N: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\Q: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\R: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\X: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\Y: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\H: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe File opened (read-only) \??\I: 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe 2204 04d0204c3e5a1e21a319f86850f5ba38_JaffaCakes118.exe