Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 16:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe
-
Size
749KB
-
MD5
5caa24f4bc344f0f0160126ce2beb007
-
SHA1
590a87dff1ddedc4a18efc104853c06d91409a09
-
SHA256
d520f90d559727ca1e2ef9aecc3af6a6b7537ddb0f30ab3e52025313dd71f6f6
-
SHA512
852374a925291d6e5fb7a2ede5f335efb0185e1474590f74eda2707795bd80bbad61b2959c03a3658974fcc0e6c5260dcc3e40de378af2237171c82a0b899c1c
-
SSDEEP
12288:K8KbyYgzl6QzKUdM48wvZ8zuQ3Msy96dMJYHiCThnuMepF:KXy9tzKUd58mZ8zl3Msy96dMJyi8hnp4
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3008 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe 3008 5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5caa24f4bc344f0f0160126ce2beb007_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3008