Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
a8b4cc6daef8df24ec2955260a85f684_JaffaCakes118.jad
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8b4cc6daef8df24ec2955260a85f684_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
a8b4cc6daef8df24ec2955260a85f684_JaffaCakes118.jad
-
Size
4KB
-
MD5
a8b4cc6daef8df24ec2955260a85f684
-
SHA1
fe04fd03d494c33f8a81bdb24d317a9dae8a9f16
-
SHA256
d3481fd9b581408fe23679c05ee13d105904e66cbae53b743353697a1b9be171
-
SHA512
95615dbcaa21f14c083ac9c037c569cfb73b520335c2ecf8eaab0cb5dec5cd0a9560f65cb0a143bab6fb7a92849c98c85460493fbdb1ee28b1c00df2a01e4172
-
SSDEEP
96:KjiRthOYEk5Ul1MLthI/73gnfnITBjk7bpvElQhXgu4fVZ:KjiR7XUlqLtejgvITBI+cQD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a8b4cc6daef8df24ec2955260a85f684_JaffaCakes118.jad1⤵
- Modifies registry class
PID:1560
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2240