Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
443625bff3e1d088994b1e41ebd26844_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
443625bff3e1d088994b1e41ebd26844_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
443625bff3e1d088994b1e41ebd26844_JaffaCakes118.exe
-
Size
164KB
-
MD5
443625bff3e1d088994b1e41ebd26844
-
SHA1
9c701f2d965853c1bd74df6922a27b268d07de0d
-
SHA256
b93f2f106ec21f6761c322792f9e318a1dfde4785fa7433f8c0519ece204aa53
-
SHA512
6aacb7c29e3e6f00045dcefe5ed6d45966a4d91dd19ec41fc363faae67deb042a96445a5d559a3cc61dcda46d20f8e3e477c74fd8e99cb7327d5762220c53e30
-
SSDEEP
1536:fgzg4qVriXPoXMEr9JIQbuq19CW5cCZPLGUobW/0:IzIVrioXl9CMjgW5tZKUoT
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 443625bff3e1d088994b1e41ebd26844_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 443625bff3e1d088994b1e41ebd26844_JaffaCakes118.exe