Analysis
-
max time kernel
134s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 18:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe
-
Size
64KB
-
MD5
35e9aa6e0558496bb6d69aa3807c60b8
-
SHA1
0b1a6b6309e77919d77204109504bc66605fdbfe
-
SHA256
c28578b16ac18c5e8b2b43a89138c25312750ba0be7f309cf6c8f3c566be4e3b
-
SHA512
5ff739bc24ded8305661383c015e9ce7cc0b544c4f9f9edcf7497c644c663334fa9399d231723164700914ee709b36f523af395428d189c010067f6588d833af
-
SSDEEP
768:UXjczpMCoBLwPCBg/JWP5+fV7TyrFNTPLedRt6cPLlSVeun7cKrB/GmjTPJWFPfN:7Kui0fNe/OdLTlSB9/GCTY5IU
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\PK7TCY0V.exe 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe File created C:\Windows\PK7TCY0V.exe 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4344 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe 4344 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe 4344 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe 4344 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe 4344 35e9aa6e0558496bb6d69aa3807c60b8_JaffaCakes118.exe