Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:05

General

  • Target

    68f1d7f764680a84e8cb714312016b3f_JaffaCakes118.exe

  • Size

    258KB

  • MD5

    68f1d7f764680a84e8cb714312016b3f

  • SHA1

    b7ffd2a5793f9ba6ef907e70673270341afdba03

  • SHA256

    053953316ac41295ca1dd2a86ac82ad4d8975b6f3cfd11984e74ea7f77573b9a

  • SHA512

    c57bec112880fdd3a568d061cf6b680c13b87c1437b6ad1d9b12b3360049e486309d97c4f30f3a16513e351baf5e3159ca0b30f02f604261b9ff91cecde65657

  • SSDEEP

    6144:WIgf/3kvKek0KnZxidhLnipQFaeFVvi+1/cxBF:Vgn3Mnkdx+h7ipmp2xBF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68f1d7f764680a84e8cb714312016b3f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68f1d7f764680a84e8cb714312016b3f_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1728
  • C:\Users\Admin\AppData\Roaming\Horrified Band\Horrified Band.exe
    "C:\Users\Admin\AppData\Roaming\Horrified Band\Horrified Band.exe"
    1⤵
    • Executes dropped EXE
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Horrified Band\Horrified Band.exe

    Filesize

    64KB

    MD5

    5489b6bdafe1668c18c05a48e0e1685c

    SHA1

    bf63488962aee275f7dbb281f4048a345f453541

    SHA256

    8eba2b60ef0dfaa36744d3c5e578034193281c85ed4a8e1b09aec4ed6af3a524

    SHA512

    2006f93af95a5f0c0e68db6f16759da7448eeb8da9cd2a38738917a2fe0203180d53f15d31ef2561d866af52422555ae29a11e444ce1697135776e11676241c2

  • memory/1728-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1728-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1728-4-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1728-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1728-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1728-5-0x0000000000160000-0x000000000018F000-memory.dmp

    Filesize

    188KB

  • memory/1728-12-0x00000000001A0000-0x00000000001C7000-memory.dmp

    Filesize

    156KB

  • memory/1728-9-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1728-16-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1728-26-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1728-28-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB