Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 01:40

General

  • Target

    934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe

  • Size

    257KB

  • MD5

    934e7a7298a0a541cd3e67ccf9e5fafa

  • SHA1

    1c9355e8ee319dbaeb2582dde2a42a1f6c01f44c

  • SHA256

    163bc66647056a5fbc738ec6c8a7005ce2eabba63c12bbac462869a4616e8c6e

  • SHA512

    12ba4eedc236919edf978fab18936efc1f806c976d773cfd98a8da9b2c2e90c50a85fbac61aa8c3590ee19cce01673a034f964f33e597b0163db76f3d8ac046b

  • SSDEEP

    6144:GHTymns3VuNKm8usZjQxNC6WJ1wWbt78t7:0sUb8/jQxNC6C5t78t7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2972
  • C:\Users\Admin\AppData\Roaming\Dull Reality\Dull Reality.exe
    "C:\Users\Admin\AppData\Roaming\Dull Reality\Dull Reality.exe"
    1⤵
    • Executes dropped EXE
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Dull Reality\Dull Reality.exe

    Filesize

    64KB

    MD5

    ad0e292e37e3395c0390cb9579b83b29

    SHA1

    c7fdf2d544e88072e99dd664bceb0bb9f7af784f

    SHA256

    94557e04dd3fbfb361716d00a85f37d050940da59d881675ea1bef5f00b67bd6

    SHA512

    7636f87692fff1ab185a087f0ef2ae58e00963195d647efdb934bbfde286dbfc9ec0cf2944feacf2a599aec11daa6ecadd29673d237c73175c5c7f96882b6f57

  • memory/2972-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2972-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2972-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2972-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2972-4-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/2972-9-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/2972-5-0x0000000000170000-0x000000000019F000-memory.dmp

    Filesize

    188KB

  • memory/2972-12-0x00000000001A0000-0x00000000001C7000-memory.dmp

    Filesize

    156KB

  • memory/2972-16-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/2972-26-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB