Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe
-
Size
131KB
-
MD5
49e2c69e25ffe3957c47412628954c5e
-
SHA1
7da3fc4e046837423594805b3174e6238ea87e0a
-
SHA256
caf1d1370d936316fb8b58bf5cdc8c9f8553f4c432ef4da6f14ae9bfc9dd2bcc
-
SHA512
47ffee6cffe8d7db363c0ea149ff40626638c8987d73cc425dbf4b05032b8a7973af831880e60289064500503f0b38edd5574dc7cb3f7a02a44fba92bec3b7a3
-
SSDEEP
3072:wjoornnDPDBkII5MwA76cu6ecTzFdex8iWpBh5f:vuPeII5MecuuTzqx85pBz
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21 PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21 PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21 PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21 PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21 PID 2264 wrote to memory of 1208 2264 49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49e2c69e25ffe3957c47412628954c5e_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5fb738f50c45a7fb9e3a6f9fbe9c0c815
SHA1baa7f90a9049d08896c3a23e4f9cecae19d5f722
SHA256887248e4db73439da92818708644915be54b24c34192e29c555e12a89c101841
SHA512db77837367205feaf8d8658ca6bdd95ceca6417a0ec7a129b97d074f81db9623176694f3bb0337901460f6212800783a6d758ab34a70a5465b545a69557d809c