Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
28e524428048ad92374cbdfd59fce255_JaffaCakes118.jpg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28e524428048ad92374cbdfd59fce255_JaffaCakes118.jpg
Resource
win10v2004-20241007-en
General
-
Target
28e524428048ad92374cbdfd59fce255_JaffaCakes118.jpg
-
Size
6KB
-
MD5
28e524428048ad92374cbdfd59fce255
-
SHA1
4387bbefe70501ee54b01995bc71ca699a4f722c
-
SHA256
6b4158ee9bbece986e6b34ddbbf01c631554ac322b6125992fe3691067affa94
-
SHA512
6daa38f8ad1b49b265b15708a56bab4631206de55554275ed78e1ac1598256e31ccc6ff8bf4da593ebfc2b347fc8b29b7cf8554457ff4d21df294e3dc3d02ae0
-
SSDEEP
192:C0yF+qY2wLxXzEX72TgJqWlxz5OKrGhX8Y:CBF5YXXzyJq2wKShXP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\28e524428048ad92374cbdfd59fce255_JaffaCakes118.jpg1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2708