Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 21:33
Behavioral task
behavioral1
Sample
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe
-
Size
6.6MB
-
MD5
e35575598dc806a16ca43a2e565bbd3d
-
SHA1
a8494670848886ee5e3cbe2e29c1a549349a9b16
-
SHA256
fedefcfd77d1bf5826b7a94d92481c93a35d19db2d24aa61406954a4b61f7b9e
-
SHA512
6df40380dc586043332ffee3eedc5fb270946c8d083b6229dcea421bc3eb7e9a966354718dc78430478f1567776e0a2bdd833a4fb1f3de506ab7a6f22af22de7
-
SSDEEP
196608:/4CoUiu9Yuw7SEgvOFcjD0azHEWYkjSMzGcb8R:gHUbZw7S9vOFcjLgWfSMFgR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Obfuscated with Agile.Net obfuscator 5 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2512-28-0x00000000003C0000-0x00000000003E0000-memory.dmp agile_net behavioral1/memory/2512-29-0x0000000000F10000-0x0000000000F30000-memory.dmp agile_net behavioral1/memory/2512-30-0x0000000000540000-0x000000000054E000-memory.dmp agile_net behavioral1/memory/2512-31-0x00000000051E0000-0x000000000524E000-memory.dmp agile_net behavioral1/memory/2512-32-0x0000000007450000-0x000000000759A000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/2512-25-0x00000000010C0000-0x0000000001C28000-memory.dmp themida -
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exepid process 2512 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2804 2512 WerFault.exe e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription pid process target process PID 2512 wrote to memory of 2804 2512 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe WerFault.exe PID 2512 wrote to memory of 2804 2512 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe WerFault.exe PID 2512 wrote to memory of 2804 2512 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe WerFault.exe PID 2512 wrote to memory of 2804 2512 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 9562⤵
- Program crash
PID:2804