Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe
-
Size
257KB
-
MD5
7338ecc3b235c3c92de9584ccf26e947
-
SHA1
445e361a0cdc10c8256c05575451ae1e9ce9c655
-
SHA256
056fe321c32c0dd98babdf16303ee3decccde11fcf8d7444445ddcba1ca05c92
-
SHA512
b5d373c97c8e8a305f98f3d54b798b6c14a3c1cc7eeac9611501ca1b89fc2d657adf7c32508bd1a57f93d88836c2d84afc0c69298759a6e02d6503f132b1eea1
-
SSDEEP
3072:W3tpk0dCvZITety9kqAZETZsd3qTGhMuIj2h+tgz1tRpkNphVGXCPfTpEgdHPHTn:WPk084etyiJU6ayhTz+Czsh9Tp9lPHTn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2652 Supportive Pack.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\NANDSave.job 7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7338ecc3b235c3c92de9584ccf26e947_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2900
-
C:\Users\Admin\AppData\Roaming\Supportive Pack\Supportive Pack.exe"C:\Users\Admin\AppData\Roaming\Supportive Pack\Supportive Pack.exe"1⤵
- Executes dropped EXE
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD537f6aa5aff16ab6c053d7df777ac0801
SHA16368e6de7e65ab84f8e4e0b7a6ca7ae19f56a437
SHA2564feed799600361f4bf3e566f25d725372af1843e9bfc49beb102fc0b631522b4
SHA5125774db7168bbd52b997700dfafc895fa8a2035aefbd8416e7fd10e0e1bbb6a6f6b44ca03fe1e309bc4f406e7e67990bfa9b1ad42713248c1b74be8215179ae06