Analysis
-
max time kernel
23s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
860dbc750671b955409cbebe85a893a1_JaffaCakes118.jpg
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
860dbc750671b955409cbebe85a893a1_JaffaCakes118.jpg
Resource
win10v2004-20240802-en
General
-
Target
860dbc750671b955409cbebe85a893a1_JaffaCakes118.jpg
-
Size
40KB
-
MD5
860dbc750671b955409cbebe85a893a1
-
SHA1
b5468052a1b2b0a4ef78c3795487dffe78348b09
-
SHA256
157b76aa1f3f607eb674dd994ceabf616fe98dec4ee62da27101bdd0aa08f9da
-
SHA512
e8e8a7bc4e3d9a9683171241be23a4a2e0518c3c41a65112038b31a8b3539ca30f34f46a929a057083ea672bb8c1b79566f5bc72b234390bcc6777400306c9eb
-
SSDEEP
768:LQ9ZsRKmr88Y4GCRTq3FZKYei/H2O+tyrcU0Jd9oaecQSNHZU8s+y8+34cMh:E9ZfmFfGCRlYeif2O+Y4Uy7oa/bNHu8h
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 rundll32.exe