Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 04:50
Behavioral task
behavioral1
Sample
18d52644fd480a23c33080fde439af20_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18d52644fd480a23c33080fde439af20_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
18d52644fd480a23c33080fde439af20_JaffaCakes118.exe
-
Size
358KB
-
MD5
18d52644fd480a23c33080fde439af20
-
SHA1
2c3cb4dc538fcc8b4c0106392e9c0f0261a57e66
-
SHA256
bb83ebe73bba5bb71ca73e60b30c412ebc5c6a84bd54d816b0ce52086b920887
-
SHA512
34030fba43b21ffa4cb1779e0d636aaf464220c09a7344455d0c3034d254a8683a83b9bde31be328be9d026be2b79b6a7d83cc8d84be0dc744bfa4cb8753beca
-
SSDEEP
6144:wl8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoSPt:wl837cCHJrccvZPRjoSPt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4676-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral2/memory/4676-12-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4676 18d52644fd480a23c33080fde439af20_JaffaCakes118.exe 4676 18d52644fd480a23c33080fde439af20_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ac2fa58bd789ad3a4cce0148ef78d8b
SHA15febb056eda08ae402e9d1d0aa022d2106619688
SHA256a8d8a76c5d9f3abca4951aad52fe2f3b20255da3a1a8c96ce5e131acd92747f9
SHA512b75963e250cb91211a7c25cb95315115cc4c1b48bdf64fba107ca0bf10bda310664e95ea2e5a28a2bb072bb92283cea413c80006a8772b3eea0c5da3b4f1db17