Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe
-
Size
258KB
-
MD5
9743aed2918a3bb52abac43fbbd7ca35
-
SHA1
c2ba496eff64fd5feb7e062ed40ac4ed0bd8cae5
-
SHA256
12af05d57b5edf0759ea5d1f600bc448f4a14dfdc1d5efbbff1ff067b768cd71
-
SHA512
39a2aa67dcc9a24e228c8d6667f3c16e718392c937543b459482022fdb1feb529c3146b8785ae2f7d339619abfdd35ac89a598055ae36c10ffce5423349d7e40
-
SSDEEP
3072:Aa5URtSDuesPS0PaEqEWGr0KpTTWB/WykLwEIRbfbsRBRlHIKcrahl4WsHEHbPRw:AWuflP5ykGbWZVmql4WogPR7s
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DataTools.job 9743aed2918a3bb52abac43fbbd7ca35_JaffaCakes118.exe