Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe
-
Size
231KB
-
MD5
f0c7560b95d08638ec5da0b453ab3718
-
SHA1
3393c5272adf4c958a2a351ff1aad715e357e996
-
SHA256
5d35343a913a5ae06d548a42ff7259437ac56120002d7086e36bc91cbab89c1b
-
SHA512
0a1dc3d42852d3a331f438cbaf0ad2f15de3a40802fb7d80ffe5f33c97996160957b5689ac59422a5875f25874b4cbcd27b7e5c83a204f875032518950ac92c5
-
SSDEEP
3072:IRpZJ0o5hrwxxsc7T00S9w99vvC77LrTIKk16URrEsTfweQZxH:qthw3sc00mwHHC7f4KkAE1fXQXH
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Bidaily Synchronize Task[973b].job f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0c7560b95d08638ec5da0b453ab3718_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2520