Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe
-
Size
323KB
-
MD5
14d9720385d0ffef91e0a30ee73a27c7
-
SHA1
b7804e25c234ad8959f8da856cff9b4a5047a392
-
SHA256
e4a9a6fc75a95ef538e2f0b01dfdd516c832442b790484b3e36cc1c5a9c8c0ca
-
SHA512
308360dca1afd0b1eaf98561af1efca8115bf8dcd32ed3052948a588318481c6699194916d7df2fab4fff8bb7bc521655b5341a2944c377d2e5eb1559901c715
-
SSDEEP
6144:y3iwawH6+/57Pp3eRV0XRXs8jbsGaUiwFb/VkNo0:FwrHPBxeRwXPighkNo0
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SearchHunt.job 14d9720385d0ffef91e0a30ee73a27c7_JaffaCakes118.exe