Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe
-
Size
672KB
-
MD5
bca30d8617b185b86ee0fb3459f2541b
-
SHA1
3f9afc917314ec1c2ba8dd0fa43e69353314d5fe
-
SHA256
8dfa1bdb1d62159136f4921b81172cc17a3ab5611e49d3edef0bd47a069735f7
-
SHA512
e6863e3733649a9b7eb9d28bc8f95d20acc6b724cd8d0be6b088407cb4f3ae3f6eb5960b68679a0829d0be52b21e4bb659da7ef01275cf7319aa625914d06674
-
SSDEEP
12288:3aMrRTCF+ppLl14NHuARVJygr+gk9N5uNLxF9OK/:yFMLSO8VJynX3udxr9
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bca30d8617b185b86ee0fb3459f2541b_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks processor information in registry
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD515c20617a1b97a40b19ce87f549b02c0
SHA1ccd9f726921b1739b8f9f70c98121f731878716a
SHA256a8e4cd8ee31dbbfc0b15ff9799c84ef6a03c718f4f364a64341e82d79665e309
SHA51235ef7500854d2d828f6811e318e5921b69cba9c58b8387bf440c1adf0c6af541e66c2a1ef19a9b6c69169c7483f6875e586f8240c1a52896bde34b148ecf8bac