Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:09

General

  • Target

    eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    eabbc010240b7745dd56cc674cc9c94b

  • SHA1

    7fe0fb82f84d5e8094aee90a943ac37bd0d95172

  • SHA256

    1081087d65a2d31745fc263102db3c4e5ae199e33f2d7d5823740c99f606d6a1

  • SHA512

    2a322c3dbd2011c979aeb08aa31e50116bc4208a319bcac50543b552ab6d18bdc6ac87f532352487e82af914acbd18ac0cc1f08cf317435b25d1a2b9efcab011

  • SSDEEP

    6144:e3I/t4j4VgCzNJGZCVAqtMXbq5a0YfuIBcGFEbNUk7veo5:CICj4KiVjtMr4YfWGiSwveo5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2184
  • C:\Users\Admin\AppData\Roaming\Bold Love\Bold Love.exe
    "C:\Users\Admin\AppData\Roaming\Bold Love\Bold Love.exe"
    1⤵
    • Executes dropped EXE
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Bold Love\Bold Love.exe

    Filesize

    64KB

    MD5

    91349ca77fedc1ac295077dfaac4b201

    SHA1

    c081f2625275120aa21b8eb7094eea4f92671546

    SHA256

    f2d7a4fb542a1c716de82d207dc08dc2aaa2ebe99e8e4b7c14fdeefdc3f5c873

    SHA512

    b6eec5cb83ada88251c77c903e548e3d6c72568fdfac58e3b92b9ea8edbd9a1f0255549b7b9b89e213bcec32873c51f86251e1bb0d68b4ae573e0ee6d4877068

  • memory/2184-6-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/2184-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2184-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2184-4-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2184-5-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2184-3-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2184-11-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/2184-7-0x0000000000890000-0x00000000008BF000-memory.dmp

    Filesize

    188KB

  • memory/2184-19-0x00000000034B0000-0x00000000034D7000-memory.dmp

    Filesize

    156KB

  • memory/2184-23-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/2184-2-0x0000000000130000-0x0000000000132000-memory.dmp

    Filesize

    8KB

  • memory/2184-27-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/2184-30-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB