Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe
-
Size
258KB
-
MD5
69e089a8c25fecc71db2eb5445f69824
-
SHA1
1f59e520f4035b774e140a6fb612e324d3e32c29
-
SHA256
12e177c1398fa885af02bdeec2de0c3a386a794ea587ec073e222fb57855e532
-
SHA512
46c01907041dfa4f9549da1503376894f11f408f7f2d87f35ec47cd871616fa38dc4cd5d194cd651e6f586981e9a3acea12fe3d8fa3eaec7e3b877090ab5a956
-
SSDEEP
3072:wUwy3nA5CvMN1oWx49EcYBRX4kIPd5FEXk8SYXCXFqaw0FCtBRX38bKKUU:DwyXAg0HTBn4v5FE0JQCnwrT8bKK9
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\PocketNotes.job 69e089a8c25fecc71db2eb5445f69824_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/856-25-0x0000000000530000-0x0000000000559000-memory.dmpFilesize
164KB
-
memory/856-22-0x0000000000530000-0x0000000000559000-memory.dmpFilesize
164KB
-
memory/856-16-0x0000000000530000-0x0000000000559000-memory.dmpFilesize
164KB
-
memory/856-12-0x0000000000610000-0x0000000000637000-memory.dmpFilesize
156KB
-
memory/856-9-0x0000000000530000-0x0000000000559000-memory.dmpFilesize
164KB
-
memory/856-6-0x0000000000580000-0x00000000005AF000-memory.dmpFilesize
188KB
-
memory/856-4-0x0000000000530000-0x0000000000559000-memory.dmpFilesize
164KB
-
memory/856-3-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/856-2-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/856-1-0x0000000000030000-0x0000000000031000-memory.dmpFilesize
4KB
-
memory/856-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB