Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe
-
Size
172KB
-
MD5
fa1987133b2d916e4d78a098f971d8d4
-
SHA1
9df24a4559fb1a096f8cd0be0107694f07107df4
-
SHA256
713486adab26dc5fea0afd1b497d63f81067f73879c76bfb3de9705813c876d8
-
SHA512
c6f0987a47b639b42a796d3843e9e77c9cca9902e2c55271f39935af9fc1e6ea6b201475d3cffdc8749c4b67c1b4be224261aac31653d5418c600b9696534d60
-
SSDEEP
3072:/udVacZkgThi98F5Wt9uTsbHUTzXdmoNKt:0hZkSo27Wt9uTsbHCbC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\initial = "c:\\Windows\\System32\\msdumprep.exe" fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\G: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\K: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\M: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\N: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\H: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\I: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\J: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened (read-only) \??\L: fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\SysWOW64\msdumprep.exe fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\msdumprep.exe fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\Windows\System\msdumprep.exe fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe File opened for modification \??\c:\Windows\System\msdumprep.exe fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "c:\\Windows\\System\\msdumprep.exe %1" fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa1987133b2d916e4d78a098f971d8d4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
PID:2744