Analysis
-
max time kernel
94s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
-
Size
104KB
-
MD5
313cd4d2b406d9a71804238f6e8bafbd
-
SHA1
20dd5390076409b55f1eb59da7cce83d7fbbf849
-
SHA256
ab4866124d555f988e03f4385ee60fe984fac77e71f24ab2ab985f94ced2bb4e
-
SHA512
52cb336ddc3ffde206f1a27afe31c3e7c10ce8792ed5407800c659aad5a747212dfe24cd37a2dca830d3a2134b93a161c5c09e4b2fc7fea1cc0dd285d9700ee1
-
SSDEEP
1536:go67yQgnYztnwkURbiPBrRif7K4cmR3H9hYMp7YewLlr8potg9CXjdpnC6ZRrqk:goD1Y9LURU9YT3c+3dh/8DG6Ycdgy
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4884 313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD59f65625cb6f436cf362c35591dec1d34
SHA1591fc6604218ec7a0e8fd269ee09ddbac231168b
SHA256f93a88931285f2468be25f4a5d5fcc60245fc096ebefa8dad1792aedc978ec3c
SHA512dd930313fb407cd174824861879749c90c0a05c216b1e798ad1e57900d4cd75ec97728f55aeb54f0f5f25c08df5f49644d71445a7574f4fb66fcd44e1a919555