Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 01:28

General

  • Target

    b62d3793956d47d81e383c348e4c1427_JaffaCakes118.exe

  • Size

    320KB

  • MD5

    b62d3793956d47d81e383c348e4c1427

  • SHA1

    9c95d413274e410ba7f40fd1f303a5ffc47726b1

  • SHA256

    218e5d6a2497b9e71a115b1c095aacfe05c45c54958e77470604a4486c7c0537

  • SHA512

    12bed91ed37890a2753323e02fbb240a4015cec850417525e8d7f60501334a3bb65d44fc116834f73dcca6d0fbaba8d6e7917fdaf3272e3c6e0f06acfbf8b194

  • SSDEEP

    6144:8brdxW4s21mPExdY3yK+/hNoypykIqvow9pU8nLN:wy451mcY3yK6uyIjqR9pxnLN

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62d3793956d47d81e383c348e4c1427_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b62d3793956d47d81e383c348e4c1427_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:2184

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2184-1-0x0000000001010000-0x0000000001050000-memory.dmp

          Filesize

          256KB

        • memory/2184-2-0x00000000005A0000-0x00000000005CF000-memory.dmp

          Filesize

          188KB

        • memory/2184-9-0x00000000005D0000-0x00000000005F7000-memory.dmp

          Filesize

          156KB