Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 19:11
Behavioral task
behavioral1
Sample
3e89bc1f0ea90832b32d8de90feab118_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e89bc1f0ea90832b32d8de90feab118_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e89bc1f0ea90832b32d8de90feab118_JaffaCakes118.exe
-
Size
464KB
-
MD5
3e89bc1f0ea90832b32d8de90feab118
-
SHA1
217fe7b336f31b3a4b61f6023467d79c4f506cae
-
SHA256
76693e5ac9285df089598ed41211d018cbd1b7c59fa2ed2350cca8c4b5ade8c8
-
SHA512
730b23f52296dd05ac7b0f5b6470e24554e687744f4330e7e7e1f4a5f21eb431c220806b1f07592bab30d956a7dc432e58079721f6d05064ea12d81d93ca9379
-
SSDEEP
12288:kjkArEN249AyE/rbaMct4bO2/VhsEiV0S5Z+:HFE//Tct4bOsXsEiV0wZ+
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-12-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-13-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-14-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-15-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-16-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-17-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-18-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-19-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-20-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-21-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-22-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-23-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-24-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral1/memory/2552-25-0x0000000000400000-0x00000000004D7000-memory.dmp upx -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2552-12-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-13-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-14-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-15-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-16-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-17-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-18-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-19-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-20-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-21-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-22-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-23-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-24-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe behavioral1/memory/2552-25-0x0000000000400000-0x00000000004D7000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 3e89bc1f0ea90832b32d8de90feab118_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5a26be074ea18b45cbd90befa9ddf1720
SHA1bda590a1d1d1dd3fcb2679b10c2facf05eed8db1
SHA256ed9ed9189d89d56d93f91298e40ef6566ce8ca7388169100d43ff973a372a415
SHA5125e40aad92108e49f8b35a7718da247284782c350bd2b381e0bedde820b7e48bfdcce7ecf5003d6c7261137e64942b5c36ec74bd6a38d3521cb9796a7829ade1e