Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe
-
Size
340KB
-
MD5
a40718049568062a27a4b65fafc47f56
-
SHA1
8b5da5d2229515037e7b74d42ceff03d8e6a88e3
-
SHA256
358acee4a278999b4e567c8af901b26c72103e3c52ccf3f768f08a9131125dc8
-
SHA512
00d5ae953a1d36c19efe1b242b01ab07cab75d30a317f36f3e03e5a280efbb13356dfdd5a9feacf0b161ec0be2916e6df3f52bfb9cbd1324d4958b0226ff440c
-
SSDEEP
6144:MoS/RRruuKggC7pHuutLa4Q4Y5GtpyW8hiekhzUND8:MTRhKggOHuELa4Q4eGtoW80LuD8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 Believing Bevy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\WorkThatBody.job a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a40718049568062a27a4b65fafc47f56_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:3044
-
C:\Users\Admin\AppData\Roaming\Believing Bevy\Believing Bevy.exe"C:\Users\Admin\AppData\Roaming\Believing Bevy\Believing Bevy.exe"1⤵
- Executes dropped EXE
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5988c01d600dc52a6cce0bcc83a0d65da
SHA1dde9bd780f93c69b8127227358b5ccb512b7f302
SHA25604bf95d11f5af19c67eb15a46e16a2fb46c418e9d2da670a9854dac5e212ad10
SHA5121a2acb5542d9ceb6eef30b43912aa219da8fd06e654c43a1dd9e5bf898abcc2c27ce3d59681b47ad5f683f21c4cf096b3794e8b6575dbb78a49aaf05eb9e11c1