Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe
-
Size
259KB
-
MD5
7a40ee2cab5a8ea348c6a5e00176e44c
-
SHA1
871193e1254faedb840bb460925e89491c7fbef1
-
SHA256
205827fb1dc0e048a0000c639966c4948beaf6381fe38e64e2451810b644917f
-
SHA512
13fdcae51cd331e304c14f1020ae52a5f071637a3cdc43b1ff42630c92ccd8fea1530ba62075d0ca1026c8ff2236007d40b1e399e33a05871314e52c29ab8dd4
-
SSDEEP
6144:64r1f3p4J7tIlnW1L9yM3xMO6tEjsV+wD8+O7qDWb:/Jh4ltXL9DqOCuQ+Y3O7qDWb
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\GiantFunds.job 7a40ee2cab5a8ea348c6a5e00176e44c_JaffaCakes118.exe