Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:12

General

  • Target

    ea90280d267b7e92fc05df6b431301b0_JaffaCakes118.exe

  • Size

    259KB

  • MD5

    ea90280d267b7e92fc05df6b431301b0

  • SHA1

    b442efd3391cc9f09af4e83d5d21d7a555bd753e

  • SHA256

    155483c096456d906187dc4d3c0907dd71d971a214ae5c70cd8a735b54196661

  • SHA512

    87a1975122210a742d27c9809da2bea8e4843b6f9dbdbc646ea01493e293111a94f6a390d427b805d3fdfc804c70a42d7149c47242aa8726f1663cb4917cd73c

  • SSDEEP

    6144:jk4VxGzEF7ItaiJgU9boeHwOj4rlv1TDGa6:jXVxd7WNKeQKA1Tya6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea90280d267b7e92fc05df6b431301b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea90280d267b7e92fc05df6b431301b0_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2332
  • C:\Users\Admin\AppData\Roaming\Sardonic Shoal\Sardonic Shoal.exe
    "C:\Users\Admin\AppData\Roaming\Sardonic Shoal\Sardonic Shoal.exe"
    1⤵
    • Executes dropped EXE
    PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Sardonic Shoal\Sardonic Shoal.exe

    Filesize

    64KB

    MD5

    89b335e07708e0e2813c758ba839442b

    SHA1

    f318ec6e7d5c84456256fa28388da5fe5a55c263

    SHA256

    f1a308346a7dcf1abf3ee0b48b24ccf790c029b87359472820eb39578eb61a37

    SHA512

    fe2d36b30b3c44452b67078c8bcd3945c5fa983b1381bee21658d65af23d795d14f453d179af968bf65741b3a5cfd83eec8fff89a00f4de19415face39e19de5

  • memory/2332-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2332-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2332-4-0x0000000000150000-0x0000000000179000-memory.dmp

    Filesize

    164KB

  • memory/2332-3-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2332-2-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2332-5-0x00000000001A0000-0x00000000001CF000-memory.dmp

    Filesize

    188KB

  • memory/2332-12-0x00000000001D0000-0x00000000001F7000-memory.dmp

    Filesize

    156KB

  • memory/2332-16-0x0000000000150000-0x0000000000179000-memory.dmp

    Filesize

    164KB

  • memory/2332-9-0x0000000000150000-0x0000000000179000-memory.dmp

    Filesize

    164KB

  • memory/2332-25-0x0000000000150000-0x0000000000179000-memory.dmp

    Filesize

    164KB

  • memory/2332-28-0x0000000000150000-0x0000000000179000-memory.dmp

    Filesize

    164KB