Analysis
-
max time kernel
23s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
82aa8908e4a07f5a281e6b4dbbd15f8f_JaffaCakes118.jpg
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82aa8908e4a07f5a281e6b4dbbd15f8f_JaffaCakes118.jpg
Resource
win10v2004-20240730-en
General
-
Target
82aa8908e4a07f5a281e6b4dbbd15f8f_JaffaCakes118.jpg
-
Size
54KB
-
MD5
82aa8908e4a07f5a281e6b4dbbd15f8f
-
SHA1
e161692a9598b1c9bd6efd9a0c1defc7e252d327
-
SHA256
583da0dc6a9dfc663a968d49c6ab8e4d566654c52046be760046d58258eb5e8d
-
SHA512
562b913bae427b37ac14af50ba5fdb447c8bc1f4c47731b2847c6b877e2575d02f3b30ee3a5e1104b2f542b7aca0b7997b5d93e8a8e94ad321cfa256898c5b2e
-
SSDEEP
1536:zR4KHi4h0Bth5bnNGR4KHi4h0Bth5bnNvnrc/HZMBACy:zPHildnNGPHildnNQj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 rundll32.exe