Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 00:28

General

  • Target

    65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe

  • Size

    258KB

  • MD5

    65569d97181cd416cfc63e17d28b92cc

  • SHA1

    66e7e8b13ba1992dddbe30c095cec312998fbe5a

  • SHA256

    05bdb12565aaaa09598a298459770d1c24f0a00e64c347ff55f3be9ff8aba727

  • SHA512

    b7e44b1592f012d0cfc14441270b2ee5f09b5b465c25c62c83ed4cfc25e61e0c564b3b697aafe44a02628cc00727cbf41ecde3f7877625d96ae717dac38a5cc9

  • SSDEEP

    6144:3Igx8pG3kvKek0KnZxidhLnipQFaeFVviYdCBw:4gh3Mnkdx+h7ipmZdCBw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1684
  • C:\Users\Admin\AppData\Roaming\Bold Team\Bold Team.exe
    "C:\Users\Admin\AppData\Roaming\Bold Team\Bold Team.exe"
    1⤵
    • Executes dropped EXE
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Bold Team\Bold Team.exe

    Filesize

    64KB

    MD5

    8b2e3c123a6419e4b9926ebed1966943

    SHA1

    a600d9870ade53739b757e7a174d2c98c693ed7a

    SHA256

    7d0472a3a54b0a7139e7ced5d5726d657303e988d032f8372015880ba0207b01

    SHA512

    1bcf34a64c573640a9ca9a3c57411ba4bfbd8cb13b8dbb18cbc5ee1facb907d0b6265ae4f441cf6d663d0bd23371568f0b200d2cdfae65bc8ec714477dfe813b

  • memory/1684-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1684-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1684-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1684-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1684-4-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1684-9-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1684-5-0x00000000001A0000-0x00000000001CF000-memory.dmp

    Filesize

    188KB

  • memory/1684-18-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1684-12-0x00000000001D0000-0x00000000001F7000-memory.dmp

    Filesize

    156KB

  • memory/1684-26-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1684-28-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB