Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe
-
Size
254KB
-
MD5
691defac6e4133d11ab6e70ed25022e9
-
SHA1
31b086c67d3603d6235d921beb0158117df746da
-
SHA256
158c6a2762aea8e78bf5c1f612e48947b81f00da27f021f894dbb7fd05ab571a
-
SHA512
4b9938e8a7b0f04df7d886562df30156ce1143f8a3dcfdf714b8a4cb6fc8e2c3960c060c9c67b562d4120560c601122604835ff9fefae70a43a8268e61ebd0de
-
SSDEEP
6144:QCvnbFW3si+ptk2mIDqH12hvHz+BWt/CCI28:QCPRN3r5DqayWBvI28
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Sardonic Troupe.exepid process 2760 Sardonic Troupe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\PHPTouch.job 691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2460
-
C:\Users\Admin\AppData\Roaming\Sardonic Troupe\Sardonic Troupe.exe"C:\Users\Admin\AppData\Roaming\Sardonic Troupe\Sardonic Troupe.exe"1⤵
- Executes dropped EXE
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d265f4dfe941da7815b0f520d68df89e
SHA11504b258c2a162ab8695028c8da809699af1fd03
SHA256b5b8070a0c81470144eda8ce45f23cfeb934cfad265efb5ebd14460146f95824
SHA5124afc60cfd02065b4074563469d7853c14d528925192fc168778345e7a54b22f9a44a65d5ee85f1dbb53a3995a6cbd55e06ccb848132645a914a9fbede0b5ef74