Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 05:51
Behavioral task
behavioral1
Sample
14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe
-
Size
648KB
-
MD5
14e4215206c3cb2d4b73834b80c80c8f
-
SHA1
7f932bbd5a4f484a68a52d0035fca0ba2c6ddf34
-
SHA256
a47c2af68feda5b48d9aa586a96f0aeb4bbd5e299a3a6fb564c984fc28bf55f4
-
SHA512
20914e430f2926301f0737d4ca1cc72fd83eccda38ac9fcb42f9c1f40bd987193a7658444f904ba46efb4c016b8573456a575c91b422df5253601d980ac6cfe1
-
SSDEEP
12288:O6Wq4aaE6KwyF5L0Y2D1PqLFYkAAAGAAAAmGL3:UthEVaPqLy2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-1-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-2-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-3-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-4-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-5-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-6-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-7-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-8-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-9-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-10-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-11-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-12-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-13-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/2172-14-0x0000000000400000-0x000000000056A000-memory.dmp upx -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2172-1-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-2-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-3-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-4-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-5-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-6-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-7-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-8-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-9-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-10-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-11-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-12-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-13-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe behavioral1/memory/2172-14-0x0000000000400000-0x000000000056A000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe 2172 14e4215206c3cb2d4b73834b80c80c8f_JaffaCakes118.exe