Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe
-
Size
259KB
-
MD5
4043526d54ac144ff8d32b6010151719
-
SHA1
6300dcf007ccb6204e42af91f8d5a423422350ef
-
SHA256
226dba9f433ee56ceae790661c98dde3a086762950297410b7033c3eaf8b3183
-
SHA512
5bfa0ada524ea7024e11f2d6f57ac2e72a80114a5a37b7da232aff4e4b85a588549430fabea72977e27509c96ef2f9ca172297130e3a275e8fdc6442c8307077
-
SSDEEP
6144:t1f3p4J7mGGW1L9yM3fMO6tEjsV+wD8+O7j5IeWJ:7h4lXL9DkOCuQ+Y3O7j5IeWJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 Outraged Swarm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\GestureControls.job 4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4043526d54ac144ff8d32b6010151719_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2576
-
C:\Users\Admin\AppData\Roaming\Outraged Swarm\Outraged Swarm.exe"C:\Users\Admin\AppData\Roaming\Outraged Swarm\Outraged Swarm.exe"1⤵
- Executes dropped EXE
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57b3fcf6ba1e2507d960edf8d4f25730c
SHA1b08d6339b2e74d75e17c109c3b96b950aeb3f73b
SHA25667c4e99b0e66b75473288e70e0e98348256f8a69603db57ff7912f923c83f5bc
SHA51240bdaa5bfd62fde82619ea5438cd37abe3ac63c83f1522375361b5f0b45cf3000909c1e40b556b77b8ce3b7ca2ab38e4213fea9dc11713291ef63b3091f4c04e