Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe
-
Size
230KB
-
MD5
6917484485548a2bd5b21d45f80922ad
-
SHA1
005ebc1bc103ce5bc17bb3ce256d32537586b10d
-
SHA256
52a4aeb50a4e50b42618defa945744759c4f50150bd595f83df1942499060d08
-
SHA512
ede9d3bc3e7f24c9275ced874e51b7dda9ef139a854b08e4c2e7d97672d3c8c109a04eaba4cc818821d8e9a36629a397d61869b08ca3f7ca772589ecc2eea1ce
-
SSDEEP
3072:QyjOCIRsmorXzUPpFZ/vvMb7eMtps7CUxKz8i5utX+fIEH9XF8UPGMrlyORDR9c2:VA8rMT/vvMb6IYC/ItOwEH91g2gSyDU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Supportive Range.exepid process 2692 Supportive Range.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\TestMyVision.job 6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6917484485548a2bd5b21d45f80922ad_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2068
-
C:\Users\Admin\AppData\Roaming\Supportive Range\Supportive Range.exe"C:\Users\Admin\AppData\Roaming\Supportive Range\Supportive Range.exe"1⤵
- Executes dropped EXE
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b430bc9435ae97736c2ec89fda90d0f9
SHA12e21b5babd4dac520eaec8efd42d245a7c9498a9
SHA256af19b1469d27036867f8c657a0b4aa51075db60d1d3e8ed3a049725c374f6828
SHA512e1aaebc208df7fdd00fab5b10057023161662ad7f5e33660add2ada6ce6279f79d7f953d7b168309180ad7c56e3d1d50c8e81c48eba167be26dd2acd9c61e75c