Analysis
-
max time kernel
8s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Errors
General
-
Target
f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe
-
Size
497KB
-
MD5
f8bb1006c0d2cf24f48ea45460f2749b
-
SHA1
fc870f69b9d7e60e2e2495f9da32cc94d4e125b6
-
SHA256
b66957f149c013200664743df79d5a1536be7d23160f533e12d4a3322a1fa094
-
SHA512
44819b2759b7982b9ebec60f39f813f9650c6edc408e2dd938c4225575995d3104d0344a92561c53ef8cf3d1586ed271a47060eb5e0b2d28a2470fbb0b7c6a4a
-
SSDEEP
12288:Q+HK20IiMeLyKvBzW1pQNyNNJ0HSUoP/ROnLFncCY:jq2iM1KvBzBentrP/sna
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2672 4672 WerFault.exe 83 -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\InprocServer32 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msvidctl.dll" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\TypeLib f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D} f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\Programmable f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\lzySFpzP = "_YoLQvmCDNaXgnPZl{eTEpCdK]utlagzoBEim}FBCzrf{}\x7fv`lB[QEo|V{hr{WQ|BGPb{ImVDnLr}nsEyzgCJSbNQLExx@mAu[uZhrM}nimAgu}gEiCJUiWeJFp\\ap" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\Version f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\lzySFpzP = "_YoLQvmCDNaXgnPZl{eTEpCdK]utlagzoBEim}FBCzrj{}\x7fv`h_BOfg`Wz\\v{WQaCHdBq^eGFAhWX{EYKlX|THKuzkvqR\x7fc]riQYcrwW]qttv}WffyM[jIDY~vjHhTaRVsl" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\ = "XDS Feature Segment" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\Implemented Categories f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\InprocServer32\ThreadingModel = "Apartment" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\TypeLib\ = "{B0EDF154-910A-11D2-B632-00C04F79498E}" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7CBA76D-D7CB-A76D-D7CB-A76DD7CBA76D}\Version\ = "1.0" f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4672 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4672 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Token: 33 4672 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4672 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4672 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83 PID 3984 wrote to memory of 4672 3984 f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8bb1006c0d2cf24f48ea45460f2749b_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 8963⤵
- Program crash
PID:2672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4672 -ip 46721⤵PID:3600