Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe
-
Size
258KB
-
MD5
25ced0a9130e667e929bc5a57aa12c2a
-
SHA1
8ee0f8900d82440bf64f4b4a87dcd5942ab7e236
-
SHA256
1171b8095d9160253ead55cd794473bd3a7e97b4bf5fab4251a0f14cf8af6beb
-
SHA512
261ad70973d58d1cf0d65d729939c21508dee3b5474ce00b76528105db55bc1abc3c0069ca7fe17034ab105797bb4269c7c329ddbc8101feb0e27a2236ca8ecb
-
SSDEEP
6144:sTKxRVX3qSsKSqg9CRKNpFk2P/ykDg6vkV:s4aSs3q4CRKNpFBO6vkV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 Believing Brood.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FineLine.job 25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25ced0a9130e667e929bc5a57aa12c2a_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1676
-
C:\Users\Admin\AppData\Roaming\Believing Brood\Believing Brood.exe"C:\Users\Admin\AppData\Roaming\Believing Brood\Believing Brood.exe"1⤵
- Executes dropped EXE
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD591e96798fd8b1ac7e2bae814c63be59d
SHA12fdcacd20901c42b07b027028755bf3e6174fee9
SHA25667d42bf3589d3a05cd1097b71aa8c9efaa620fcaea780f740ddd11af63b67ca0
SHA5125ca044dbdc5df3f3246cf419ff3ae2e49db6e60232e351ff7a69fd0e54519c18ccfc7929bdc0742872f88bb856284790c1b2cbfb6ec61e701c183d396ad7fa92