Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:18

General

  • Target

    691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe

  • Size

    254KB

  • MD5

    691defac6e4133d11ab6e70ed25022e9

  • SHA1

    31b086c67d3603d6235d921beb0158117df746da

  • SHA256

    158c6a2762aea8e78bf5c1f612e48947b81f00da27f021f894dbb7fd05ab571a

  • SHA512

    4b9938e8a7b0f04df7d886562df30156ce1143f8a3dcfdf714b8a4cb6fc8e2c3960c060c9c67b562d4120560c601122604835ff9fefae70a43a8268e61ebd0de

  • SSDEEP

    6144:QCvnbFW3si+ptk2mIDqH12hvHz+BWt/CCI28:QCPRN3r5DqayWBvI28

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\691defac6e4133d11ab6e70ed25022e9_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2460
  • C:\Users\Admin\AppData\Roaming\Sardonic Troupe\Sardonic Troupe.exe
    "C:\Users\Admin\AppData\Roaming\Sardonic Troupe\Sardonic Troupe.exe"
    1⤵
    • Executes dropped EXE
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Sardonic Troupe\Sardonic Troupe.exe

    Filesize

    64KB

    MD5

    d265f4dfe941da7815b0f520d68df89e

    SHA1

    1504b258c2a162ab8695028c8da809699af1fd03

    SHA256

    b5b8070a0c81470144eda8ce45f23cfeb934cfad265efb5ebd14460146f95824

    SHA512

    4afc60cfd02065b4074563469d7853c14d528925192fc168778345e7a54b22f9a44a65d5ee85f1dbb53a3995a6cbd55e06ccb848132645a914a9fbede0b5ef74

  • memory/2460-0-0x0000000000070000-0x0000000000071000-memory.dmp

    Filesize

    4KB

  • memory/2460-1-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2460-2-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2460-3-0x0000000000580000-0x00000000005A9000-memory.dmp

    Filesize

    164KB

  • memory/2460-4-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2460-9-0x0000000000580000-0x00000000005A9000-memory.dmp

    Filesize

    164KB

  • memory/2460-5-0x00000000005D0000-0x00000000005FF000-memory.dmp

    Filesize

    188KB

  • memory/2460-16-0x0000000000580000-0x00000000005A9000-memory.dmp

    Filesize

    164KB

  • memory/2460-12-0x0000000000660000-0x0000000000687000-memory.dmp

    Filesize

    156KB

  • memory/2460-25-0x0000000000580000-0x00000000005A9000-memory.dmp

    Filesize

    164KB

  • memory/2460-28-0x0000000000580000-0x00000000005A9000-memory.dmp

    Filesize

    164KB