Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe
-
Size
258KB
-
MD5
4e752f014d391c252cc6aa8c30f1195e
-
SHA1
9e3898be41926eb052f505c30343b0a2fafc28a6
-
SHA256
21ffee3773a7a6e028e98549cb45e289b844e23b9835973fddd80105293cc039
-
SHA512
6a678b02abd2fb6a61107aa09971cad48cbadc4b0f5de1ebb4b96bcde6e8caf90f3381a524b401225ee27bd232e2ef1b6e15b559014291943f06fddeb3c75404
-
SSDEEP
6144:M4/Tb5/bl6qxSgZDHdKWJh0Y/1awbRzT1H6XpdEuD:Z/R/bt7YWfn/zd65dEuD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 Remorseful Redemption.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DailyDose.job 4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4e752f014d391c252cc6aa8c30f1195e_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1008
-
C:\Users\Admin\AppData\Roaming\Remorseful Redemption\Remorseful Redemption.exe"C:\Users\Admin\AppData\Roaming\Remorseful Redemption\Remorseful Redemption.exe"1⤵
- Executes dropped EXE
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bd9f0fd76416dcdbfc390af18bed35d0
SHA15fcb129b6e1d5f182e8302cff793f4ce2aa26179
SHA256ff9f9e964833455975dd803e22597b7f3a7e5c129309ab96e7abe28fefa09257
SHA512fd6a38b63742cb884bbe7361c2b41d000badd4566a43b607b2727777ed9b9bcd1752d7f755ed7fa172d76a29f207a55c6b1f94fc252cd972acf4ba3512e31ea7