Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 05:37

General

  • Target

    69e77e6a1a8b69f32543733567cbc073_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    69e77e6a1a8b69f32543733567cbc073

  • SHA1

    b85d0a9f37c6a852b831c026caddd1a39685fa93

  • SHA256

    208e4fa7639beba7a71d134826f25dfa2925b44cc5625abf384e528b399a81aa

  • SHA512

    5acf3e5556f8b0c85ed45509d814d8958df60b9889045e9512345951b0a814c34665c4e559de1615a0994219b45424987681ee2a28218e2e761378bea8a875ce

  • SSDEEP

    6144:EF9t9m+0b66dDTBhzpZms0MbqU0CVY1clryt3oiu:EVc+0JPpSMbqU0ME3oiu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69e77e6a1a8b69f32543733567cbc073_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69e77e6a1a8b69f32543733567cbc073_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:616
  • C:\Users\Admin\AppData\Roaming\Hating Flutter\Hating Flutter.exe
    "C:\Users\Admin\AppData\Roaming\Hating Flutter\Hating Flutter.exe"
    1⤵
    • Executes dropped EXE
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hating Flutter\Hating Flutter.exe

    Filesize

    64KB

    MD5

    807a71ebd3a91326f538d4f68dc7d548

    SHA1

    e425e2ab88ed74fd6d4438992c527efa74042437

    SHA256

    31313321f0d6d112a45b0a37c9c209132471e94425a6fcd5a2173bfe9b5e683b

    SHA512

    d974677b7a76283029b5d1aabf7725917a1be843cf52b8936bed1f30414a15700d5efab608e17bc826455294f49b2540a8ab515465113932be57d0ab408a1630

  • memory/616-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/616-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/616-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/616-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/616-4-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/616-5-0x00000000001D0000-0x00000000001FF000-memory.dmp

    Filesize

    188KB

  • memory/616-16-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/616-12-0x0000000000170000-0x0000000000197000-memory.dmp

    Filesize

    156KB

  • memory/616-9-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/616-25-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/616-28-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB