Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe
-
Size
321KB
-
MD5
768dc14af19bb07b4809cd6ad191a2ec
-
SHA1
a3281378ba956d40332d35479483c5048c09d14c
-
SHA256
06a7f53e52018d54e8197ecf6a0e8dc0d422a730a94e9056fa9ae53989892617
-
SHA512
663b3fa965e6c69a183d8b84de006c4ac313c65ad31a0664d60b8ccaf234039445987d013e9ee19de3feeaf52139e175562ac243e238ca46314b37fb7bfc7287
-
SSDEEP
6144:JUnqXBDCYfZA5dLHWEDwxcnaL3a7ByKSKBAzN:1D5hAOkwxMea7B7SKBAzN
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\HyperDock.job 768dc14af19bb07b4809cd6ad191a2ec_JaffaCakes118.exe