Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe
-
Size
322KB
-
MD5
97a4700c76dd9abeacc325f4b1049fd0
-
SHA1
d50f8ccd88ba339552e4be3a2148655219b68ead
-
SHA256
1087dc56606bdb4cc95254334aa2a8db0d0a7e2c53131aa0aae6f2b1bdd4fe20
-
SHA512
34ffc30af2c7a7357107282c1f6bab1cfa224e02f472f3c2422e5b80d675e18cc4719009ed575416d9acce3184c314259d79758f5e7a9c137ec1bc133f76d00d
-
SSDEEP
6144:4A8rMT/vvMb6IYC/ItOwEH91g2gSj3QdjO19ixgDBU:GrMTUpjJjIjeBU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 Liberal Redemption.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SmartInsurance.job 97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\97a4700c76dd9abeacc325f4b1049fd0_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:2992
-
C:\Users\Admin\AppData\Roaming\Liberal Redemption\Liberal Redemption.exe"C:\Users\Admin\AppData\Roaming\Liberal Redemption\Liberal Redemption.exe"1⤵
- Executes dropped EXE
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51a6a73139a26f0115a53b0d0d8f1139d
SHA14397ca52f5e8f8919a4d0dcb1b904b048446bdb2
SHA256e74164a7d5c3b38f190a9a834016fd4d3558e6f60790a19a22ad8fe8845ffedc
SHA512f1bbf3646f9aef50ee09303e3417e0afda9b35b17ac98d076ba2c60086cafd087e4af41c32e24b904120623795a5159b89306a9c5c622a0e5ae5518c3fd9f558