Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
ad339a1c499cb85dace8bee936a346e2
-
SHA1
ee48bf550560d71621a440122c6a2a9a50a15335
-
SHA256
8491b49a3ae1447712ef35f3dbf3449cccda6b0ced426b3c981110e142c2936d
-
SHA512
aefbacb429aade3b6bf901db45464efc133d0085c507096b987490f008032c312965d69f7a8fbd609d665095119a20e008d5df629fc38ab2e64eb4cb31f99eb3
-
SSDEEP
49152:NHY3RtblpI06JeUrVTQCWnU/Kr2qI/kycvZ:NHY3R5I06JxVT8U/dN/9K
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct ad339a1c499cb85dace8bee936a346e2_JaffaCakes118.exe