Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe
-
Size
269KB
-
MD5
277befc23bb77418c695e75f9fc0eecb
-
SHA1
0cfbfbb6095f6e806aa34eee00dcf804e72a5d10
-
SHA256
105c57cebd47539e45955b1d1dfdf19e9de2dead6379594130609610033a5155
-
SHA512
ceadf3e8a192d424ce6f9236b0359bee33167557793835742caf958b019e6f4ab30d3628fea3ce4f0b17992aa0758b469ebd532cbbc60827d25d6bee7ac616fe
-
SSDEEP
6144:5bjE8bYaL8bVGJ+ZJ/Zp+68S3C0MoJYjjUj:588bZ8J++3ZpC90Mo44j
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\HandyNotebook.job 277befc23bb77418c695e75f9fc0eecb_JaffaCakes118.exe