Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
27b1178000ffa091e6becfc3948ba667
-
SHA1
fee17dc4decb8b82a159f296d526ceb48d8b672a
-
SHA256
7f6c9be6156aae15cb8554260bb5dacdd627499cd85f1be59008a03ae0483a51
-
SHA512
5675861bbdce73cdf18e7185793c2a93702ed87e54a042ef3b15b9729b3d5f0606e06baed5f3dbd230346cc4bb64b395d68c5fb5035b0f21b1ee479e0e0bf51c
-
SSDEEP
49152:hHY3RoUlpI06JeUrVTQCWnU/Kr2qI/kycvJ:hHY3R/I06JxVT8U/dN/9m
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 27b1178000ffa091e6becfc3948ba667_JaffaCakes118.exe