Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 02:12
Behavioral task
behavioral1
Sample
0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe
-
Size
969KB
-
MD5
0bfff78e6232b563b9aceee88bce7893
-
SHA1
11ee15157932618fd3744a870418a135ab65eb87
-
SHA256
13bdf256d31c7ff93ce0a3d83a3b887168466a881ea45f29c1db6ca8bd45a93c
-
SHA512
b99e3026d884a64c8272a1a593ab9185be537f6f05cab65dbcca4da3209edc5aadd621a401ede5c49c9f8049db0b2fe65e4c5eab20ad300851514524e584d19f
-
SSDEEP
12288:IoyiX7A1GpoGcvPvNPozYIOX1csS2BgJBD7:IoyXQYP86X1zSTD7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1044-0-0x0000000000400000-0x0000000000700000-memory.dmp upx behavioral1/memory/1044-7-0x0000000000400000-0x0000000000700000-memory.dmp upx behavioral1/memory/1044-9-0x0000000000400000-0x0000000000700000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1044 0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe 1044 0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe 1044 0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe 1044 0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 0bfff78e6232b563b9aceee88bce7893_JaffaCakes118.exe