Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 04:37
Behavioral task
behavioral1
Sample
5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe
-
Size
359KB
-
MD5
5a7d4bfe0be25700d3a400883cdecdc0
-
SHA1
7c3737c823c91fe38049bc0f3a819bb338bd0d59
-
SHA256
216793e42e0490fb94d7a8b6156f6f85ba810a8f0600777d49c9a819a32aef28
-
SHA512
de20d3f3f386c56b45b5c6792c46df54a816390be115c6d88f2f0763ef47c202cfd0326bb248ecef7a0286d660720c1efdd2447fe20946397e3be7b151f3f1cf
-
SSDEEP
6144:ZgRyiIWQFpUv4/B+FrM144XlzKlUAzYYbuewX79GtPuB8PxwPh79i5s/CoS9iP6z:3iMCv45+uK4VKXknewr9GBY85wPTi5sa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-27-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-32-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-33-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-38-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-44-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-45-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-52-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-53-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-54-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-59-0x0000000000400000-0x000000000050D000-memory.dmp upx behavioral1/memory/3020-65-0x0000000000400000-0x000000000050D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe 3020 5a7d4bfe0be25700d3a400883cdecdc0_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794B
MD52e23a82d148b95d2c672136b77f8f1ca
SHA142ccf6a3ff48dbaf5b8aa5c87fcc4062fd1d3037
SHA256b222d55a107fef8accad8656b1cdd6228135945a6bf2ee9627fff9c55a6e13eb
SHA512f75d3bd0f053ca3b2a2b25c2bc77381b2be7b1dee8603236fa1333df36cb7446b04e7b42aa8e6c95a652a7fae2718c9119004cf623d446bbd9921d2363d56761
-
Filesize
635B
MD533f09577707d079a40f706a18e126d92
SHA10cef1f55b72a84e584a51e79a6787ea78d74a603
SHA256e7f6bd122fcb829793f4047a5b929668b0a91ebfe31247b479586ec6d8f2b378
SHA5125538c5b4e538a97796bfc412b3a81449931a9bbc1fa4e69500a0b30b35c1259bda857f392d85d87893999098bc88a432f28d2f699fadc295709a75b8113933cb