Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe
-
Size
48KB
-
MD5
1c61f91f1450e35b6caf72c35dd241a2
-
SHA1
0c762e29f6119ef574772fa26e03dd506024fd59
-
SHA256
c744e97bf436e1b8d770d4a99a382adf88b349ab16ec7016f3937548314fbe3e
-
SHA512
f3ec8fc90ddaccace4518d09269fd731a7476c4ed49cb139fbd9bc5c9181d57977505ee1f175dae1c71050eea284630cc87978565d356b495ee24d751978c1ca
-
SSDEEP
768:r++5jknOFgbpKF9POi9hYY8o2jY1MT0cKRr57i/Fz:P5jkn2opKF9POiPYY881MGip
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 1c61f91f1450e35b6caf72c35dd241a2_JaffaCakes118.exe