Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 10:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
3 signatures
150 seconds
General
-
Target
62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
-
Size
292KB
-
MD5
62ed18c745f90e5967ab39d6ca93af8f
-
SHA1
4d310285aa86a72edde2b50206dea06ba0e1dc3b
-
SHA256
301fb1ff039d383584b90f9bbce74b49d271b3566e1568f34c3ac87b1e20230e
-
SHA512
cf174a6cc871d6cf2dce9b3223831dbecafa5b73ee9bf238349b50f87cedeb3b94a4d215aa3fcbd10b402679b54eff1b929deb1f728c6e356b25fe2d3a5c7c9d
-
SSDEEP
6144:33s8C5BKmvXmh0gP+SsURd7tUVT1cEzL4BE:MwOOP4jmE1
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe 4328 62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62ed18c745f90e5967ab39d6ca93af8f_JaffaCakes118.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4328
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4072