Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 00:54
Behavioral task
behavioral1
Sample
183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe
-
Size
16KB
-
MD5
183126f21fbdd4757a2ead7765de46d7
-
SHA1
1d061907f8ad2e190f2aee7c08d3a3efadf35e02
-
SHA256
1a056948f8473bc2a9a8574d80c35de1c08bedf4ffd1b967128e64725723d9ed
-
SHA512
5388a9ed581948175defbc7612cc4d80062919825f1825556f0bc8e3ea12fb4cf2ff5425941043f567531129b1b34d5f8c97127c03dfc7829fb5c9f74b94c4f5
-
SSDEEP
384:1bxWeM1S98i47Rfd1Cku/a2N31rvnHvz+s:pPMmK71Ckj2/nPi
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\scottiez.sys 183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\scottiez.sys 183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1644-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/memory/1644-13-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1644 183126f21fbdd4757a2ead7765de46d7_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ba8f89caa12a78ecab4c1bf8fba60f1c
SHA1ec0ff523f177ca1063cfbfc7e375b56a53115739
SHA256f9a95bdf4184f22e2683561a2300a8978eed25f94acaf89428110f1bef69c594
SHA5125a924e5b8b9605d3d711b15bcf5fd8245632de8f504696863a29571316c10967fb003a31be47c1a42d6a5cf9633d211298ab2dd3a8e6118ab6a670823bc4cc3c