Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
f969621963e8aadd361c7608911cf21d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f969621963e8aadd361c7608911cf21d_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
f969621963e8aadd361c7608911cf21d_JaffaCakes118.dll
-
Size
1.8MB
-
MD5
f969621963e8aadd361c7608911cf21d
-
SHA1
729f9b4093eec4d600e60f7d41896c4c469a7ac4
-
SHA256
8eb4a9d8b09d762de7f9fe088be6ef2d01803ee72773ba44750578ae9309e55e
-
SHA512
c6c1505efc2595094ab6439e5bae4c92d69c3960237a1f2346c89e4b55fd74ba9f01d46f044327bd90d9841d3ceb7d0f98e1816accee11f44b2162a26bfdf4c6
-
SSDEEP
49152:3d+qrcHQSSsP5lAuvjDbzOHmd/R/TofjPQx/:3d+3HQfqlAMjjOHmdZyQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4184 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 884 4184 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4184 rundll32.exe 4184 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4184 1780 rundll32.exe 91 PID 1780 wrote to memory of 4184 1780 rundll32.exe 91 PID 1780 wrote to memory of 4184 1780 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f969621963e8aadd361c7608911cf21d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f969621963e8aadd361c7608911cf21d_JaffaCakes118.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 7843⤵
- Program crash
PID:884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4184 -ip 41841⤵PID:3696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:936