Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe
-
Size
334KB
-
MD5
9635acc7602aaf1b2b1e9d1c71c8c004
-
SHA1
46173b1551a2b024b39a1dbefe4b7299e1017235
-
SHA256
2053c90ef7c90c49616e5ea0509801dbf43299b0e2c8e7089b35ea604720aea8
-
SHA512
de77992b2e5b6b8c19d164a01b1acb6364ac332082f75ffc9096b9690d61c935964d1e0944f4c33dea864f89fd4ab132cf61eba7689d0ba553e0664c3a12a909
-
SSDEEP
6144:E1saf30Bp9iMt67ZbzlNRnNGVv+Y35Pv/Gs:KF/0BhsbhNFGx3lv/Gs
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SmoothRecorder.job 9635acc7602aaf1b2b1e9d1c71c8c004_JaffaCakes118.exe