Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
-
Size
269KB
-
MD5
56ff6f46d2fff7f2bd274f47a034ad5b
-
SHA1
6b906efc64955e8e5ddb95437535bb05f2e8ddce
-
SHA256
e57add8cb2755528b791b3b56de4db9bc1ce882a8f3acb83bc96a748e8675806
-
SHA512
5ea996f4e18a05136ec1ba76d7682431b135d7370bf87fd31aa72fa7ac5009799aa5d371590cb5eeaa2e09e2015891edd7cadfa457d8b63aad3ddcf747865bfb
-
SSDEEP
6144:1q2IfhRSli2Pw1KUqiuIwPzn09JipIDO71MVY4bvH5VccgjLABM11Ybhw9EP4hQv:I/Sli2Pw1KU1uIwPzn09g4OpMVY4bvET
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Drivers\Etc\Hosts 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Desktop.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winnit.exe 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winnit.exe 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\windows\System.ini 56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56ff6f46d2fff7f2bd274f47a034ad5b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
PID:4900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD556ff6f46d2fff7f2bd274f47a034ad5b
SHA16b906efc64955e8e5ddb95437535bb05f2e8ddce
SHA256e57add8cb2755528b791b3b56de4db9bc1ce882a8f3acb83bc96a748e8675806
SHA5125ea996f4e18a05136ec1ba76d7682431b135d7370bf87fd31aa72fa7ac5009799aa5d371590cb5eeaa2e09e2015891edd7cadfa457d8b63aad3ddcf747865bfb