Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
7561f95f0f001441634fdac906030b72_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7561f95f0f001441634fdac906030b72_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7561f95f0f001441634fdac906030b72_JaffaCakes118.exe
-
Size
136KB
-
MD5
7561f95f0f001441634fdac906030b72
-
SHA1
70f438716ae49ac721953300970a1ec18991a9d8
-
SHA256
e35347b1bc4a3fdb5a795f2435dc7aeec4ec0fa616914eb2a815a0501f965275
-
SHA512
ac06edf16d6ddfc1598cc65cee4e79291848df8e08846dd52aad1104d744a2285d557f1c8feb11a0b8e8a99f782f23dfb23ef32e8f3de4809151e896bea7e644
-
SSDEEP
1536:rlYdiGO3y3LwonhZ8eqvov89sRmyeEF4022rIf+UpCrp+hBtfRYvq:rti3LPXGoU2e6402uU+iC8ntfRYC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1040 sssscc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sssscc.exe 7561f95f0f001441634fdac906030b72_JaffaCakes118.exe File opened for modification C:\Windows\sssscc.exe 7561f95f0f001441634fdac906030b72_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sssscc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz sssscc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1776 7561f95f0f001441634fdac906030b72_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7561f95f0f001441634fdac906030b72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7561f95f0f001441634fdac906030b72_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
PID:1776
-
C:\Windows\sssscc.exeC:\Windows\sssscc.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD57561f95f0f001441634fdac906030b72
SHA170f438716ae49ac721953300970a1ec18991a9d8
SHA256e35347b1bc4a3fdb5a795f2435dc7aeec4ec0fa616914eb2a815a0501f965275
SHA512ac06edf16d6ddfc1598cc65cee4e79291848df8e08846dd52aad1104d744a2285d557f1c8feb11a0b8e8a99f782f23dfb23ef32e8f3de4809151e896bea7e644