Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe
-
Size
255KB
-
MD5
993fff7e6d66c20f1a5e7ff009dfdf63
-
SHA1
6cf5667afc1e116ee36f2ccf02efb586600e35ec
-
SHA256
61633c1d56ab16305148104dd0c11dbc873d81124168f83d8be4de8f86fd6008
-
SHA512
94dabd38ba83bb96804e6acc60c681a4f6d94ff04fb285045433f4d26a6cf38aa91c10295b9ab1fd10b18529208b7a34251240d51c792311e493e7d17e39c636
-
SSDEEP
6144:i1X7/jbFzSFhDsWyF966fSdgewsVeMnnkZRgMlA:MrrR9v9R6dgdOesnkZRzlA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 Bitter Quiver.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SearchUp.job 993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\993fff7e6d66c20f1a5e7ff009dfdf63_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:1588
-
C:\Users\Admin\AppData\Roaming\Bitter Quiver\Bitter Quiver.exe"C:\Users\Admin\AppData\Roaming\Bitter Quiver\Bitter Quiver.exe"1⤵
- Executes dropped EXE
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55872be929183316c7219213c1a33c1e8
SHA13e26a331a949123aabdaee0ddb7ff0d10b320276
SHA256149ba804648fdeb8b4a133b494693a8812a9d9f9e61351d08a76a55c990196e8
SHA512b5648a572c87dff2594ef06b565d618abc48f67ba534189513cc4dbe78282d011ce4daa0890e9df884a82e1852960de4abe537017dd3d8fc12b12872f56f3552