Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe
-
Size
258KB
-
MD5
65569d97181cd416cfc63e17d28b92cc
-
SHA1
66e7e8b13ba1992dddbe30c095cec312998fbe5a
-
SHA256
05bdb12565aaaa09598a298459770d1c24f0a00e64c347ff55f3be9ff8aba727
-
SHA512
b7e44b1592f012d0cfc14441270b2ee5f09b5b465c25c62c83ed4cfc25e61e0c564b3b697aafe44a02628cc00727cbf41ecde3f7877625d96ae717dac38a5cc9
-
SSDEEP
6144:3Igx8pG3kvKek0KnZxidhLnipQFaeFVviYdCBw:4gh3Mnkdx+h7ipmZdCBw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 Bold Team.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FactBox.job 65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65569d97181cd416cfc63e17d28b92cc_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1684
-
C:\Users\Admin\AppData\Roaming\Bold Team\Bold Team.exe"C:\Users\Admin\AppData\Roaming\Bold Team\Bold Team.exe"1⤵
- Executes dropped EXE
PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58b2e3c123a6419e4b9926ebed1966943
SHA1a600d9870ade53739b757e7a174d2c98c693ed7a
SHA2567d0472a3a54b0a7139e7ced5d5726d657303e988d032f8372015880ba0207b01
SHA5121bcf34a64c573640a9ca9a3c57411ba4bfbd8cb13b8dbb18cbc5ee1facb907d0b6265ae4f441cf6d663d0bd23371568f0b200d2cdfae65bc8ec714477dfe813b