Analysis
-
max time kernel
141s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:19
Behavioral task
behavioral1
Sample
385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe
Resource
win7-20240708-en
7 signatures
150 seconds
General
-
Target
385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe
-
Size
191KB
-
MD5
385d85b2906bf9dcc603968f2358f040
-
SHA1
112a073bad14967c91088abd472bf9a58cd6dd60
-
SHA256
9f73368b9d34abf077adce9bd0872275353e35a0beade57b3790c4faff3ec2ae
-
SHA512
82809bd3769c321427f686d998a65819bb570161dd48721aebddc140d57e659eead5cd9c8bd02569c2a026c30e3655ece2118c133d755c6cda9775f17cbadc64
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vX:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3560-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3560-15-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3560-17-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3560 385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe 3560 385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe 3560 385d85b2906bf9dcc603968f2358f040_JaffaCakes118.exe