Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe
-
Size
257KB
-
MD5
d4ecad2bde9654cae72ad7a52f275ee4
-
SHA1
cd61fe0b20382c65959413ce7b1c02003f2fcd06
-
SHA256
058e4c90af412a6f037021357f7f4d883159b2962d6db9dfe4669e8c589acbcc
-
SHA512
01d60d6fd0727459a0554d41ff807d54d367099240f3942696aaee57870af937950dfa09fffe3060271982f980f65d145d69755c92cacf989d001dcd0efe65d3
-
SSDEEP
6144:dzK/JCI8JMlVY8/eUR+9m4tU0rEqwqb7VrF:dzm8sTe8Xj0rxJnVrF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2556 Intelligent Nest.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\EasyBank.job d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4ecad2bde9654cae72ad7a52f275ee4_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2112
-
C:\Users\Admin\AppData\Roaming\Intelligent Nest\Intelligent Nest.exe"C:\Users\Admin\AppData\Roaming\Intelligent Nest\Intelligent Nest.exe"1⤵
- Executes dropped EXE
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bec92079e54bec879642c09d8221669b
SHA1063a593826aeb9964c2d700e7c8d33216d7b453c
SHA2569d5f0cd1415c414bb5d9c6b718c70c6fbf3be5ff1d75733e7cc485c71c702c78
SHA512095a132ce4c0ec35f0b62dc137f32a214bfc70d6d66fdc91a4e2db516d437d0d7c0b96923d8794ea49c97f0620cb0f478f2ba64c34efb4321ee36b797be4a72f