Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe
-
Size
361KB
-
MD5
eabbc010240b7745dd56cc674cc9c94b
-
SHA1
7fe0fb82f84d5e8094aee90a943ac37bd0d95172
-
SHA256
1081087d65a2d31745fc263102db3c4e5ae199e33f2d7d5823740c99f606d6a1
-
SHA512
2a322c3dbd2011c979aeb08aa31e50116bc4208a319bcac50543b552ab6d18bdc6ac87f532352487e82af914acbd18ac0cc1f08cf317435b25d1a2b9efcab011
-
SSDEEP
6144:e3I/t4j4VgCzNJGZCVAqtMXbq5a0YfuIBcGFEbNUk7veo5:CICj4KiVjtMr4YfWGiSwveo5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 Bold Love.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SlideRemote.job eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eabbc010240b7745dd56cc674cc9c94b_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2184
-
C:\Users\Admin\AppData\Roaming\Bold Love\Bold Love.exe"C:\Users\Admin\AppData\Roaming\Bold Love\Bold Love.exe"1⤵
- Executes dropped EXE
PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD591349ca77fedc1ac295077dfaac4b201
SHA1c081f2625275120aa21b8eb7094eea4f92671546
SHA256f2d7a4fb542a1c716de82d207dc08dc2aaa2ebe99e8e4b7c14fdeefdc3f5c873
SHA512b6eec5cb83ada88251c77c903e548e3d6c72568fdfac58e3b92b9ea8edbd9a1f0255549b7b9b89e213bcec32873c51f86251e1bb0d68b4ae573e0ee6d4877068