Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_66037239aa96e722f20864b8a140576e3c592cafe2d9a6067b3ff349ea851792.iso
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66037239aa96e722f20864b8a140576e3c592cafe2d9a6067b3ff349ea851792.iso
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#WPNMD903WEBNSM.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#WPNMD903WEBNSM.js
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_66037239aa96e722f20864b8a140576e3c592cafe2d9a6067b3ff349ea851792.iso
-
Size
74KB
-
MD5
56f3d5b3cfe778258257aca98b973e91
-
SHA1
b0a6e1937ed6e21842c7759a3cd19979eab63c63
-
SHA256
66037239aa96e722f20864b8a140576e3c592cafe2d9a6067b3ff349ea851792
-
SHA512
1d70cf6b2d109367dcf7279ba8d60dbb9bb032a5e5230bac7926f46b71c1a462097590bada7685df3b6f9a9a014a25d6de35052f0a9e178a8a6c37af122dbdfc
-
SSDEEP
384:se4Np85FCpanpunSDi5WMsdoujUpoo5SU2Vc65Xvvt6:sNNW/2s8j5W/5sooE3VH5Xvvt6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 1528 cmd.exe Token: SeManageVolumePrivilege 1528 cmd.exe