Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe
-
Size
259KB
-
MD5
89657379a784ba9e186afbbe8583a018
-
SHA1
8de72eea05e9033ba530dbb015c47809d1123ee6
-
SHA256
2456d5c9c21a5db5eb2f43ac9df087c736b587bfb4fc9f976034189b00582f37
-
SHA512
723a787bfc1c90f2993f81850aa25237e39d676d388e137a6f4d724a5f50f4aefe2ea7a0f3126dade8f7d969cf36c86710726def3409cfbbe58be11bbf2aeb75
-
SSDEEP
6144:Qbcg2jnmuq9pm0v846b+Fg2C0dVKkGq/F:42jGZ8Dl2Cq2q/F
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\BusinessBuddy.job 89657379a784ba9e186afbbe8583a018_JaffaCakes118.exe