Analysis Overview
SHA256
053eeeae7546119659d57d61d78bccabf8071fb64303814d741b5235ea5df13a
Threat Level: Shows suspicious behavior
The file a368af692e9d6351910d44a546fc461a_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks installed software on the system
Maps connected drives based on registry
Drops file in Windows directory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 01:42
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 01:42
Reported
2024-06-13 01:44
Platform
win7-20240221-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Checks installed software on the system
Maps connected drives based on registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum | C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum | C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\BloatAway.job | C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ringmynorth.biz | udp |
| US | 8.8.8.8:53 | allmodel-pro.com | udp |
| US | 204.11.56.48:80 | allmodel-pro.com | tcp |
| US | 8.8.8.8:53 | fullset.info | udp |
| US | 8.8.8.8:53 | moodmodel.biz | udp |
Files
memory/1724-2-0x0000000000510000-0x0000000000511000-memory.dmp
memory/1724-1-0x0000000000030000-0x0000000000031000-memory.dmp
memory/1724-0-0x0000000000020000-0x0000000000021000-memory.dmp
memory/1724-3-0x0000000000520000-0x0000000000521000-memory.dmp
memory/1724-4-0x00000000005D0000-0x00000000005F9000-memory.dmp
memory/1724-9-0x00000000005D0000-0x00000000005F9000-memory.dmp
memory/1724-16-0x00000000005D0000-0x00000000005F9000-memory.dmp
memory/1724-12-0x0000000000740000-0x0000000000767000-memory.dmp
memory/1724-5-0x0000000000710000-0x000000000073F000-memory.dmp
memory/1724-18-0x00000000005D0000-0x00000000005F9000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 01:42
Reported
2024-06-13 01:44
Platform
win10v2004-20240508-en
Max time kernel
79s
Max time network
99s
Command Line
Signatures
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\BloatAway.job | C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a368af692e9d6351910d44a546fc461a_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ringmynorth.biz | udp |
| US | 8.8.8.8:53 | allmodel-pro.com | udp |
| US | 8.8.8.8:53 | fullset.info | udp |
| US | 8.8.8.8:53 | moodmodel.biz | udp |
| US | 52.111.229.43:443 | tcp |
Files
memory/1576-2-0x0000000000FB0000-0x0000000000FB1000-memory.dmp
memory/1576-1-0x0000000000FA0000-0x0000000000FA1000-memory.dmp
memory/1576-0-0x0000000000F80000-0x0000000000F81000-memory.dmp
memory/1576-4-0x0000000000FD0000-0x0000000000FF9000-memory.dmp
memory/1576-3-0x0000000000FC0000-0x0000000000FC1000-memory.dmp
memory/1576-9-0x0000000000FD0000-0x0000000000FF9000-memory.dmp
memory/1576-5-0x00000000024A0000-0x00000000024CF000-memory.dmp
memory/1576-18-0x0000000000FD0000-0x0000000000FF9000-memory.dmp
memory/1576-14-0x0000000005570000-0x0000000005597000-memory.dmp
memory/1576-23-0x0000000000FD0000-0x0000000000FF9000-memory.dmp
memory/1576-25-0x0000000000FD0000-0x0000000000FF9000-memory.dmp