Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
19743945fd57f60f77b4338f49206386_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19743945fd57f60f77b4338f49206386_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19743945fd57f60f77b4338f49206386_JaffaCakes118.exe
-
Size
140KB
-
MD5
19743945fd57f60f77b4338f49206386
-
SHA1
b13ec6b484d6127894ec83d0a10f381599cdc28f
-
SHA256
bd459a9bde677fcdfe17525e087ec5a5b742fc98b0a7898e152d0712788ad435
-
SHA512
eeec50a20e6c84311eb190d4c2784b815f32cd45fe6b10ee10fcf384107a7aa7d367219a5e03966f13862eb1e9a2ef9583ead4717dbdafa66da75dc75d4e103f
-
SSDEEP
3072:hdQaC0defyEh4O5uXjHEE++3dvZJxr7nJtGg:IaCOeRh4FjEELNvRbJI
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\E: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\G: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\I: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\N: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\O: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\S: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\Y: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\Z: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\J: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\K: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\L: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\Q: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\V: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\W: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\B: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\H: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\M: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\T: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\A: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\P: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\R: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe File opened (read-only) \??\U: 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3748 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3748 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3748 19743945fd57f60f77b4338f49206386_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5976fa0a7cd190c11e4e0962e6e51ff79
SHA126f94e570fad6a96944b67774e3ea80dd81ebaf9
SHA2569be789974a81a7b6ac69cded9194e773b0a75ca669f8d07fad2f44a2ef1d0b46
SHA512a37dc9ead7fdcd6ecccd44617dc5cc9966901ebcb79043a4d1244e65bda1260a29f3cd8911bbd0b1dce846b03a3bb2ce77ec0411d8aae9584ea46ef84631c2a2
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b