Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe
-
Size
92KB
-
MD5
2666bc8e9efab5f06797b3c9ba7e9498
-
SHA1
5c6809b5e80739c012dc357439c2a50ae04e9662
-
SHA256
5e79e5a1aa4c0f3448dbfc20d05c71d9d67556e7adee86940284bf9f317edb3d
-
SHA512
3fab9865c4c43c516822add47fa2a1a2600165b60bc2d738b3fe438f846844b75b518eb8f9e1f0739474aeea575e1e0e7f1cac42dcf2b75d1eb002300c25bad1
-
SSDEEP
1536:j2ria5FUjZSktWoqhDv6Zm4vAt9feIjlxtwZ9uUzPT+M4UfQ225QYrBvuOTX:arlLUjZDKv6HO92IjXtO9uUT6UQDHBvt
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2736 2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5cd541a1e8eb4f6c4417c71cac841c908
SHA17c8a44b85541867e383f5e413c24c7f6a4c10119
SHA2560f8bf2a7ca7f3c422b66b5899229676d5b4f5f2fadc23a154897c793a5471466
SHA5124ea013c425d70ed382832ddef80628ca896f1cd35276fb7c4f3d403e0b3ef9078566fbe79eabf74bde15d4a7efc450f7671c1d8ad56cf46ee036702b4769df80