Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 13:48

General

  • Target

    f624c957b27315d70f4e0150f98bc34b_JaffaCakes118.exe

  • Size

    259KB

  • MD5

    f624c957b27315d70f4e0150f98bc34b

  • SHA1

    dee05ea8aba95f8b893bdc805cf2d73c8b43853f

  • SHA256

    115e44501310b97b0415c405d0f7afd88688792ebe38ca3aafeb6a51848f0c5a

  • SHA512

    454aa6ae3371d8ef65d298dd6229803c99e91d0f72ccc2f5af3abeac261e581f3a606efebae4f5e8091a2a94de35079b02734f04d1258faf4a1c54fc2b84851f

  • SSDEEP

    6144:mnrxg8pAvPq1P/R8qVV1BkCVvFJtIlcEDfcy:mra8TN6qxBkCRWvfcy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f624c957b27315d70f4e0150f98bc34b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f624c957b27315d70f4e0150f98bc34b_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1916
  • C:\Users\Admin\AppData\Roaming\Believing Infancy\Believing Infancy.exe
    "C:\Users\Admin\AppData\Roaming\Believing Infancy\Believing Infancy.exe"
    1⤵
    • Executes dropped EXE
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Believing Infancy\Believing Infancy.exe

    Filesize

    64KB

    MD5

    921844ed728c3f4433782ad222b4c029

    SHA1

    8bc27220b5eaa3553b0b51e89f97c17ac916e0dc

    SHA256

    2a75a9e4a9135f1558212838d3c45621745b37b4d299a8588abd1ee95ba4a822

    SHA512

    239ab79244cd847236166caf0dd8bd89e68fa778fb72fef0a8cd1d1fc4a68684bc2b59b1d1f0cece51148a964e4f09dbb4f95463de41e5c7a6f7efa8ea17037c

  • memory/1916-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1916-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1916-2-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/1916-3-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/1916-4-0x0000000000530000-0x0000000000559000-memory.dmp

    Filesize

    164KB

  • memory/1916-9-0x0000000000530000-0x0000000000559000-memory.dmp

    Filesize

    164KB

  • memory/1916-5-0x0000000000580000-0x00000000005AF000-memory.dmp

    Filesize

    188KB

  • memory/1916-16-0x0000000000530000-0x0000000000559000-memory.dmp

    Filesize

    164KB

  • memory/1916-12-0x0000000000610000-0x0000000000637000-memory.dmp

    Filesize

    156KB

  • memory/1916-26-0x0000000000530000-0x0000000000559000-memory.dmp

    Filesize

    164KB

  • memory/1916-28-0x0000000000530000-0x0000000000559000-memory.dmp

    Filesize

    164KB