Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe
-
Size
60KB
-
MD5
29fb005faf9f0e686c92188b7facf976
-
SHA1
8373a6816fe220968c288f2cebf9713d1aa6d5f5
-
SHA256
efaaf1d70ee42354c15130a5d2c7fe430355c341daec875923c8921ac9eeeadd
-
SHA512
dfb1e2389ebbb9da1cf255f4b2242f8d9f955d5688928937e79d029a61f1f187cb879a341f221d7adbde5b9fc3671992ba0a33f000004ea7f6993c7b7e78cd99
-
SSDEEP
1536:mkGglZV68R9XKHS4WOduDBkQ2gdYJsXCa5hteY:m9glZQ29aHRWOYevqh1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main 29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1360 29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe 1360 29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe 1360 29fb005faf9f0e686c92188b7facf976_JaffaCakes118.exe