Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe
-
Size
40KB
-
MD5
49f8a759588d799b5d385a11cb0ca939
-
SHA1
da7ba1f7e67f4226a96ada0bf6369a596e0212d0
-
SHA256
c1cc6f6f414b5b4ebae44bdb97ee80f2034dc6f59f1f35a839b187f61e15ee7d
-
SHA512
d7cacd03b0e0a579c42d1e1205c204083217122da7c286653ab19d7cc0a3004dcf4403456c77181b0580ffdadd02fa54cc7626989ae8527b4a1d41eb7e399bc0
-
SSDEEP
384:IGg7Ro3/bsVnuti/shfcfMMVr1zk6M7GDvhu7bnvkPEeVI7d9EY3aSkLQJWf:Mhpki/u6hg6G7bsP5I73EgRJWf
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2168 49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5ffb1e6e077a3380d38bd6b4cbd997b1e
SHA1f2dea7d30ed79f3a21e4f582e942e131398be745
SHA2560da2851c605baf6d2adc8e914d2288234664a0cf3713a8f8ea46a25a16736da5
SHA512ef4a96ec715c51780f3dc5ab8e0dab3c462f44be441d3d8fa3f6d64d206cd612959326613b903802f1c988c4586b9fd93e01058e03af66bbbeaaa14884cc5f55