Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 10:36
Behavioral task
behavioral1
Sample
283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
283e48d93f7460c8cfeb1fc95512101b
-
SHA1
d1c78c62e0f03fd6a4f6c9bc01e2697ac2d0022f
-
SHA256
7441fc9a88fb65b933450a7a8c15d962a103a0711665b2a57414ba36c8e48ca1
-
SHA512
be5fe6631d9ed62a00e13acc75ffbe59fa7d4184966d5932aca1cb3917576e72b61a14904b1de8b647e5b590584a5cd5f13bf99d6805e23d8607d981d49f00d2
-
SSDEEP
24576:rw5DsBeXx86gKfb6ZcJ9uil6rNelO7XJ/PcCnxEFKZeqCVpPU30Pqn:0DsU8pWRJ9uiQrw0FcsLS5P
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000864000-memory.dmp upx behavioral2/memory/2320-2-0x0000000000400000-0x0000000000864000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\M: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\Q: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\T: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\X: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\Y: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\E: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\U: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\W: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\G: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\J: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\O: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\P: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\R: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\S: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\H: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\L: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\N: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\V: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\Z: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe File opened (read-only) \??\K: 283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2020 2320 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\283e48d93f7460c8cfeb1fc95512101b_JaffaCakes118.exe"1⤵
- Enumerates connected drives
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 5402⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2320 -ip 23201⤵PID:3900