Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
2349634664cde3dfcb4df9dc52b7b02c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2349634664cde3dfcb4df9dc52b7b02c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2349634664cde3dfcb4df9dc52b7b02c_JaffaCakes118.exe
-
Size
336KB
-
MD5
2349634664cde3dfcb4df9dc52b7b02c
-
SHA1
6fae7e25502cd74f08c00d76da2d91198615e16c
-
SHA256
db6eee1db2abd5e8c786ff36663f68a67b919332bf941821a85a51617a5bd373
-
SHA512
1c91e95ff0d052f1c12359b1f7e503582fc335b9899e758da678625dffc3ed2fbd28c76a0aa3a44c45221c050a4a3674d4c1b381857517e8569fb31df832a67b
-
SSDEEP
3072:bNKSj84EmZsdHzzA73NjKtVAr8o5mclWcBcRhe4x5/QWfpO2PkzQo2aFyTX0oesZ:oFzmZ+zzgsturLmfhf/Pg2oHqlz
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 2349634664cde3dfcb4df9dc52b7b02c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 2349634664cde3dfcb4df9dc52b7b02c_JaffaCakes118.exe