Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe
-
Size
233KB
-
MD5
3e536aa91c936855fba04b461e065b2e
-
SHA1
84f0215ea14fa2ac45e129e055f27ee44476d866
-
SHA256
14072d2e577f5633756d2fad816379545fcc61c6ef42cd98fa9efbc4ffaa8b36
-
SHA512
b3a98550c23d95444f59422da68fd909f59c4c71adbafbf1dc0205bf67befa2356eddf9d14b48ead4274d4b86d5ed333687631e39f4593e874a3beda89c5b19a
-
SSDEEP
3072:CdXn9G3bAzJjkwG+8GlL1B0MhxifHbvpU8p8csBTPQdKbcsZJ0N2mpxUxbWzzw5c:CNn838tjFBril6P+K9ZJ0Ux1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe 1048 3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e536aa91c936855fba04b461e065b2e_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1048