Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:27

General

  • Target

    694915d4d6b9ee48308fe4d5084aa406_JaffaCakes118.exe

  • Size

    258KB

  • MD5

    694915d4d6b9ee48308fe4d5084aa406

  • SHA1

    4fa3d1f20b59a79e1485575be2993d2f256019b4

  • SHA256

    22e516370ff338a20b8a72646f5b07e1bda0e9af68184e53ac2d9f5a603bb06e

  • SHA512

    af46d0955a21e220b746dc477cffbc26e1c9abd0252aa873f3b5ced4aed6e3017b635b5ab99f77ce4e1d15f571834b2b978fcf4f091ac84b223e4298ae584f49

  • SSDEEP

    6144:LxCVKBium07dUMCC4jaOmUku9zRKRnvXdWorMjmsELsvhbL:V3iJ0dUBC4jaOf9sRnFFr/cvhbL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\694915d4d6b9ee48308fe4d5084aa406_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\694915d4d6b9ee48308fe4d5084aa406_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2232
  • C:\Users\Admin\AppData\Roaming\Sardonic Communication\Sardonic Communication.exe
    "C:\Users\Admin\AppData\Roaming\Sardonic Communication\Sardonic Communication.exe"
    1⤵
    • Executes dropped EXE
    PID:2744

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Sardonic Communication\Sardonic Communication.exe
    Filesize

    64KB

    MD5

    ef4d847c20aa623dad2d89d4829774e6

    SHA1

    078d807326b4f08b6b87029355d20b7897c1915d

    SHA256

    7191cb2350776f2ff4d1d028bc3b7ef728e61952264d184fb059003555bbb140

    SHA512

    e082edced55fe2b840780dbdd4c5a00a2a3e1afbffa4d1ad0ee5dfc3318ade68bbe52f00b27f76e7d50a9e54577852a5dabf862c6b9bc346a3c9b1445707a6f7

  • memory/2232-1-0x0000000000030000-0x0000000000031000-memory.dmp
    Filesize

    4KB

  • memory/2232-0-0x0000000000020000-0x0000000000021000-memory.dmp
    Filesize

    4KB

  • memory/2232-4-0x0000000000530000-0x0000000000559000-memory.dmp
    Filesize

    164KB

  • memory/2232-3-0x0000000000520000-0x0000000000521000-memory.dmp
    Filesize

    4KB

  • memory/2232-2-0x0000000000510000-0x0000000000511000-memory.dmp
    Filesize

    4KB

  • memory/2232-9-0x0000000000530000-0x0000000000559000-memory.dmp
    Filesize

    164KB

  • memory/2232-5-0x0000000000580000-0x00000000005AF000-memory.dmp
    Filesize

    188KB

  • memory/2232-12-0x0000000000600000-0x0000000000627000-memory.dmp
    Filesize

    156KB

  • memory/2232-16-0x0000000000530000-0x0000000000559000-memory.dmp
    Filesize

    164KB

  • memory/2232-25-0x0000000000530000-0x0000000000559000-memory.dmp
    Filesize

    164KB

  • memory/2232-28-0x0000000000530000-0x0000000000559000-memory.dmp
    Filesize

    164KB