Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 07:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
5fa4e280f538f8cee6cb3a7fd874cfed
-
SHA1
434231424e664c80d7ec3e55a277083ce5a1d267
-
SHA256
a56839d626d6a1500ddc5f464679a5cd18c8103996573b1acb2e2c0e429f5d65
-
SHA512
d5bac48baf09e9ef074241c0a3dbbed3efb5f0715e883740c4ff33e5606b1362ae1d53ebed8047c9c943e3873a5e9fd14ec4937811b870b682e27ba1a4e05991
-
SSDEEP
24576:rK6cnP7CUVfD3havQlrjRCYEGcx/L97SnZRjR3HjbVT43EBeUB793GXYFaQmXq+b:ruFVr3YvQGX2njtThQE5BR2Ihma+PlBf
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/1796-33-0x0000000000400000-0x00000000006EF000-memory.dmp family_blackmoon -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe 1796 5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1796 5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe 1796 5fa4e280f538f8cee6cb3a7fd874cfed_JaffaCakes118.exe