Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe
-
Size
325KB
-
MD5
95ebbe704ee623fbdc4384e50d3e5c21
-
SHA1
e127378a91282de0c5768767bc79b1d8fc4e7a9d
-
SHA256
169af01078c3177f38dd0e7ba27e07491893a0b3dd485f810766d1df8ccd4536
-
SHA512
d33c815a8a26260129bdd77915fdf1878be6c4643dfae2deb133618d90677358c4eb85ebf485d2209e825a985c030734d13131ec0709df1f3725bb863756820f
-
SSDEEP
6144:SAXP0ECVcLui896rs981zpUe7PXbRjSSjhJKQl:Z0Ea+C2rXFeUhEQl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 Bitter Bunch.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ProgEdit.job 95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95ebbe704ee623fbdc4384e50d3e5c21_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2368
-
C:\Users\Admin\AppData\Roaming\Bitter Bunch\Bitter Bunch.exe"C:\Users\Admin\AppData\Roaming\Bitter Bunch\Bitter Bunch.exe"1⤵
- Executes dropped EXE
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5154aab49febcac7957390c0e79c8ee85
SHA10d21cf2d933e9b2dc7855d87dbb518d5650c2806
SHA256b61755ec6b3f411d83bd679a7118eb93340e614d7bf55fd1075fc0ba88b009b6
SHA512dc0cbdd98f7f94bfdf6eee7b4ac4ff63095feb6d606bcd85cb95f4e4ced5787b4139b1235ea27be42f924d11c5a859b8a89ebc426f06bf495ed427eee002ae17