Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe
-
Size
258KB
-
MD5
612fbe90dc8eb6ed653525d1bb831f1d
-
SHA1
be8e8f795144d6dad3375ef7f9765a04000950f1
-
SHA256
3b89c0398f3ff27ab94ef8ee00222a26452771ef5a3ad19c9165c11be5dee46b
-
SHA512
c4876d328f67efd3e29f378422dc1c8f2ac41086228cf95d7f1b6d7143b8b51253318869aea7c4ac2240c21c34f273c6b56a112daf666a09823901116f66627c
-
SSDEEP
3072:zeaVr5gHqfrbmKPduWl22nimED8s1pqxt3YHADsobZph50FBRXDplTfyuURWIodS:Jr6HKbx9l2l1pqvYgwobZERHfEYhRFzg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Political Herd.exepid process 2748 Political Herd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\IntelliText.job 612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\612fbe90dc8eb6ed653525d1bb831f1d_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2416
-
C:\Users\Admin\AppData\Roaming\Political Herd\Political Herd.exe"C:\Users\Admin\AppData\Roaming\Political Herd\Political Herd.exe"1⤵
- Executes dropped EXE
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD577c59aaf7758b6c7cbbb408f4e5eee6f
SHA1949a2ac6b70561d3ee41b577ad7604e76804c370
SHA256b427de2fcdbdee478958849a47b159c2c025c320c5b6d876cd99e7a33b3a8ebb
SHA512d95889bbcc8ed1f382a59abb35a017a1149ff52ee9a5fba5482aa7115053c74c340cd392129765b36c2a28431dd2062225088263ccfad0ddd9f8468ca641f582