Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
-
Size
269KB
-
MD5
56ff6f46d2fff7f2bd274f47a034ad5b
-
SHA1
6b906efc64955e8e5ddb95437535bb05f2e8ddce
-
SHA256
e57add8cb2755528b791b3b56de4db9bc1ce882a8f3acb83bc96a748e8675806
-
SHA512
5ea996f4e18a05136ec1ba76d7682431b135d7370bf87fd31aa72fa7ac5009799aa5d371590cb5eeaa2e09e2015891edd7cadfa457d8b63aad3ddcf747865bfb
-
SSDEEP
6144:1q2IfhRSli2Pw1KUqiuIwPzn09JipIDO71MVY4bvH5VccgjLABM11Ybhw9EP4hQv:I/Sli2Pw1KU1uIwPzn09g4OpMVY4bvET
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Drivers\Etc\Hosts 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\autorun.inf 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winnit.exe 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winnit.exe 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\windows\System.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD556ff6f46d2fff7f2bd274f47a034ad5b
SHA16b906efc64955e8e5ddb95437535bb05f2e8ddce
SHA256e57add8cb2755528b791b3b56de4db9bc1ce882a8f3acb83bc96a748e8675806
SHA5125ea996f4e18a05136ec1ba76d7682431b135d7370bf87fd31aa72fa7ac5009799aa5d371590cb5eeaa2e09e2015891edd7cadfa457d8b63aad3ddcf747865bfb