Analysis
-
max time kernel
23s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe
-
Size
255KB
-
MD5
36adefe9f166140cb3a96088680894ab
-
SHA1
59f2b22a3d31dca6cf3aa4e2dad53a92e6e69212
-
SHA256
91ac9ea0a973d36c244f17246bf7c33cce93bdf94a4ad91209b50b5d8d312262
-
SHA512
6b3d7f635a8063a7db18678afa376c9910cc55593a03918c22a26de066fde253f0e3a7cfa0d9dc6fcc340daba10232d0697b70987352d0faf99eade4a27e739b
-
SSDEEP
3072:KVWIbbNbOp3n9N41CN/sqSGDqCAh6paSQGUDDlOOzC/b2+:KtbbNbOJn0y/s+DO8AS60OzCS+
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main 36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1420 36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe 1420 36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36adefe9f166140cb3a96088680894ab_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1420