Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe
-
Size
324KB
-
MD5
4eec2695db86bd713636c4d34867e88a
-
SHA1
1ff88a42a78641aa1b3057946d65524ba358eedd
-
SHA256
1309325d325413ef49152c657e9bcf0a5638a74de51892dbc9072c9c047cd304
-
SHA512
8f954fbfa9a34e39191121b0f0d2bba545f792984624993cd2a0309f0e96c41e86f18caa5b910868fec690d4e3771a11a547014b2073db0d2674fd10da457842
-
SSDEEP
6144:WxebA+raHjBXJXJc3GuffBtRQ2pWnfQVLznX3:iYA0aHtX/c1fdQ2cnfQBX3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 Annoyed Love.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PasswordChain.job 4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4eec2695db86bd713636c4d34867e88a_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2232
-
C:\Users\Admin\AppData\Roaming\Annoyed Love\Annoyed Love.exe"C:\Users\Admin\AppData\Roaming\Annoyed Love\Annoyed Love.exe"1⤵
- Executes dropped EXE
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD502c7bbc4a6d209f2a5bd25bafb40ffc8
SHA1c79f2f7f5695c77966135fef8faba68dd0b0f0ab
SHA25628103608df78236f896897baf4d6b3daeaa12c39683e6f6b47ae22f6ab80ca34
SHA5121d9b6fc199fe8590015a934ba3424a70b8e6884669e434b90081e326581b566253b4c4ef8b43cece8a77eb36a67105ada69b96775ded8df4974ff46ca253539f