Analysis Overview
SHA256
1a84f57e0657ed931d000650624c11b3dc4045c227fb31804f3d77f36511744d
Threat Level: Shows suspicious behavior
The file a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks installed software on the system
Maps connected drives based on registry
Drops file in Windows directory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 01:32
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 01:32
Reported
2024-06-13 01:34
Platform
win7-20240221-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Checks installed software on the system
Maps connected drives based on registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum | C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum | C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\Bidaily Synchronize Task[973b].job | C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | center-ring.link | udp |
| US | 72.14.185.43:80 | center-ring.link | tcp |
Files
memory/3008-0-0x00000000000F0000-0x0000000000119000-memory.dmp
memory/3008-1-0x0000000000120000-0x000000000014F000-memory.dmp
memory/3008-6-0x00000000000F0000-0x0000000000119000-memory.dmp
memory/3008-8-0x0000000000190000-0x00000000001B7000-memory.dmp
memory/3008-12-0x00000000000F0000-0x0000000000119000-memory.dmp
memory/3008-17-0x00000000000F0000-0x0000000000119000-memory.dmp
memory/3008-20-0x00000000000F0000-0x0000000000119000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 01:32
Reported
2024-06-13 01:34
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\Bidaily Synchronize Task[973b].job | C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a35faf5ef0dc7082afaa36424c5402ea_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | center-ring.link | udp |
| US | 72.14.185.43:80 | center-ring.link | tcp |
| US | 8.8.8.8:53 | 43.185.14.72.in-addr.arpa | udp |
| BE | 88.221.83.187:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 187.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
Files
memory/4932-0-0x0000000001530000-0x0000000001559000-memory.dmp
memory/4932-5-0x0000000001530000-0x0000000001559000-memory.dmp
memory/4932-1-0x0000000002330000-0x000000000235F000-memory.dmp
memory/4932-12-0x0000000001530000-0x0000000001559000-memory.dmp
memory/4932-8-0x0000000005250000-0x0000000005277000-memory.dmp
memory/4932-14-0x0000000001530000-0x0000000001559000-memory.dmp
memory/4932-20-0x0000000001530000-0x0000000001559000-memory.dmp