Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 21:33
Behavioral task
behavioral1
Sample
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe
-
Size
6.6MB
-
MD5
e35575598dc806a16ca43a2e565bbd3d
-
SHA1
a8494670848886ee5e3cbe2e29c1a549349a9b16
-
SHA256
fedefcfd77d1bf5826b7a94d92481c93a35d19db2d24aa61406954a4b61f7b9e
-
SHA512
6df40380dc586043332ffee3eedc5fb270946c8d083b6229dcea421bc3eb7e9a966354718dc78430478f1567776e0a2bdd833a4fb1f3de506ab7a6f22af22de7
-
SSDEEP
196608:/4CoUiu9Yuw7SEgvOFcjD0azHEWYkjSMzGcb8R:gHUbZw7S9vOFcjLgWfSMFgR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Obfuscated with Agile.Net obfuscator 5 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/2344-16-0x0000000005AB0000-0x0000000005AD0000-memory.dmp agile_net behavioral2/memory/2344-17-0x0000000005FF0000-0x0000000006010000-memory.dmp agile_net behavioral2/memory/2344-18-0x0000000005C40000-0x0000000005C4E000-memory.dmp agile_net behavioral2/memory/2344-19-0x0000000006020000-0x000000000608E000-memory.dmp agile_net behavioral2/memory/2344-20-0x0000000007B50000-0x0000000007C9A000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral2/memory/2344-9-0x0000000000890000-0x00000000013F8000-memory.dmp themida behavioral2/memory/2344-24-0x0000000000890000-0x00000000013F8000-memory.dmp themida -
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exepid process 2344 e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 692 2344 WerFault.exe e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e35575598dc806a16ca43a2e565bbd3d_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 14602⤵
- Program crash
PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2344 -ip 23441⤵PID:3176