Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 02:02
Behavioral task
behavioral1
Sample
24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe
-
Size
456KB
-
MD5
24429bbaa7d3c588417acacbafab2f85
-
SHA1
e7288439377b3a972ef2b5b1cded472f1b11b6ca
-
SHA256
3d452997002b439edf0851d4cdd0daedff2ea979ab50f92c6dc127eeaefcfb20
-
SHA512
fd3d029839c674eff525977caa6ad1ce6efc24ed14fe57aa8ee34ba09e5472a16e0bbe72e4418b6778b4369228565fb19d125754aa9adc50b03e85296e749722
-
SSDEEP
12288:LjkArEN249AyE/rbaMct4bO2/Vmds+lTOws/aOe:AFE//Tct4bOsOTY/Xe
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral1/memory/2416-1-0x0000000000400000-0x00000000004D5000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2416-1-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe 2416 24429bbaa7d3c588417acacbafab2f85_JaffaCakes118.exe