Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 01:00

General

  • Target

    62276c8113002957a28c92dec5c51c56_JaffaCakes118.exe

  • Size

    693KB

  • MD5

    62276c8113002957a28c92dec5c51c56

  • SHA1

    4a92db533b6a26c6fb29572f66927b87436c1e59

  • SHA256

    21d17aec7366fc49d0644fdbec0643e289f58a90dc953e710da467697dbe29c9

  • SHA512

    1134954b175a3f94229d1f589c39bd0784040f22aac6e2818b50a5df6ab1f8354ec54dfaba6228d00d62779cbcf7866f42109279183f2d6687c5ddb43f8c048d

  • SSDEEP

    12288:HPqlDAbt2HGn1dlrRe0eBkjvKghJqmMIAp4805TBzHeF4:HCrHGn1bYlkjv5hJ3MIApL05NzW4

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62276c8113002957a28c92dec5c51c56_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62276c8113002957a28c92dec5c51c56_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:5060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads