Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
1 signatures
150 seconds
General
-
Target
3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe
-
Size
316KB
-
MD5
3d9be95726eb4bb0333c6eddd3bd40aa
-
SHA1
737b4e279375edda86b1ea8857945851bf5bd6ca
-
SHA256
871432530727ae1d94571ec60175db070c7688014dc8fe0c8cbe65b3788aa690
-
SHA512
c9d44513ff108b25c8643d5c2a55ca95187c53d2b4ac640e13b0934c278e0c378ef9fab63b95db0aeb2a5cd03fde585eabd7abd4d395cf7e4db0601f332fef09
-
SSDEEP
6144:UY6I0tLFJ2kwhNcsFi9pL34QjU4dq6ESm6HiU9T5pOHUHo4DKLqFxpXADuE:UY+J2pLcswxjU4dq7gfzp/Ho4mc3X6b
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\autodiskjump = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe" 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autodiskjump = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe" 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe 2300 3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d9be95726eb4bb0333c6eddd3bd40aa_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2300