Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe
-
Size
255KB
-
MD5
8602e662ff49b9e53e842121b879b2be
-
SHA1
fc7dc21204a14d3bcc117cde9057509f9004e163
-
SHA256
2420b6fe48a70076fc40a86bb086b9b0d2ae06bc0be823fdb55b14e2542c2be6
-
SHA512
d93b836d3507f304b27bb0c3be77f4c67dbd9f95a2129fae22f6533aa663d638dc4eb8f415f8f446dc0251146221b737520087ec55db905ec354d3f634be7659
-
SSDEEP
6144:6vzX7/jbFz5lckWyF966fSdgewsVeMnnk2hVMlY:grrRpv9R6dgdOesnk2h6lY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 Not supportive Hope.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FashionRadar.job 8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8602e662ff49b9e53e842121b879b2be_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1008
-
C:\Users\Admin\AppData\Roaming\Not supportive Hope\Not supportive Hope.exe"C:\Users\Admin\AppData\Roaming\Not supportive Hope\Not supportive Hope.exe"1⤵
- Executes dropped EXE
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD520ce22b4a322c9767ae13012ecffef79
SHA1693624d585e8e75826763a882053dca1b5933921
SHA256d635ce6e9f5b27225e2bde448ebcadfdf44927e2c15e508f49d9e807a0221e34
SHA5122631056766dfd5f7f188ddf4681bd23d362fee544b75043c0e99688d0bb7bafb16df0d2c0f5615b792cd6ac1d2d366b2e16a805657829100600ffef0c6e24fd1