Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe
-
Size
128KB
-
MD5
5d9c00a1a1a7fbc0e0ac375fded0b65b
-
SHA1
23122dd825264b09c40f69b1345d0764307dd4f2
-
SHA256
405a8f12b5d60a1abd5747ea85067097d7f07599cb009f4647862ca812905f5e
-
SHA512
73721092e79e23f9b08d3793a22770ec617905eb779f5fa820b140fd79f08f4dfcee4a3f0bc0c1ad50a88724cb574feebfff43070011884fa538004b679139df
-
SSDEEP
3072:JFwx1ErKJBwYUFr2C8tXpl/aIjG+H2eaQ2x9OYdauPcZL3nXe:ng1nXC8Die2SyVPQje
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d9c00a1a1a7fbc0e0ac375fded0b65b_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks processor information in registry
PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b71821cf89cc52cd0a859a07dad302a8
SHA157db23cb7f1e5190cba0d0bc751f042eec2301cf
SHA256e0241782428509f70cf52ae744a8e490847f9cc84401fc600c069cfcd8dd5243
SHA512a3433fe427f931961317487e5f976dc834391b1b434308c22b785ee68dafb2fdf4a91fc31ce5e93fca83ff4046bd214734302202d1d1844ac29207dea9e44f81