Analysis

  • max time kernel
    138s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 06:15

General

  • Target

    fc1c55d846ed7494cc8622e55b2d5c3a_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    fc1c55d846ed7494cc8622e55b2d5c3a

  • SHA1

    f078275a46c9ffd1fff50e3202847b222d4fe5f2

  • SHA256

    4855dd71c2a78f7591413ff6549cebeb911e848fabd3ebce62c661d45f7808fb

  • SHA512

    755f1f477a535a79719d46abf3c6180fa21642f71e4480362c127e81e0d1c6ce1fb13bdd0e12cdf8485023ef3a49fb0c3ebcfa5e47c933a95b00058730b1a214

  • SSDEEP

    49152:czjkDkQxS/Yt4CdiNpavbORZv2QHYPKRJtZflMeHv5V:+jkAtzC8NpajO3XHYP2t0eH

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc1c55d846ed7494cc8622e55b2d5c3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc1c55d846ed7494cc8622e55b2d5c3a_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4764
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4592
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:660

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4764-0-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-1-0x00000000777C4000-0x00000000777C6000-memory.dmp

              Filesize

              8KB

            • memory/4764-2-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-3-0x0000000004910000-0x0000000004911000-memory.dmp

              Filesize

              4KB

            • memory/4764-4-0x00000000049A0000-0x00000000049A1000-memory.dmp

              Filesize

              4KB

            • memory/4764-5-0x0000000004970000-0x0000000004971000-memory.dmp

              Filesize

              4KB

            • memory/4764-6-0x00000000048F0000-0x00000000048F1000-memory.dmp

              Filesize

              4KB

            • memory/4764-7-0x0000000004960000-0x0000000004961000-memory.dmp

              Filesize

              4KB

            • memory/4764-8-0x0000000004930000-0x0000000004932000-memory.dmp

              Filesize

              8KB

            • memory/4764-9-0x0000000004920000-0x0000000004921000-memory.dmp

              Filesize

              4KB

            • memory/4764-10-0x0000000004950000-0x0000000004951000-memory.dmp

              Filesize

              4KB

            • memory/4764-11-0x00000000048E0000-0x00000000048E1000-memory.dmp

              Filesize

              4KB

            • memory/4764-12-0x0000000004900000-0x0000000004901000-memory.dmp

              Filesize

              4KB

            • memory/4764-13-0x00000000049B0000-0x00000000049B1000-memory.dmp

              Filesize

              4KB

            • memory/4764-14-0x0000000004940000-0x0000000004941000-memory.dmp

              Filesize

              4KB

            • memory/4764-15-0x00000000049D0000-0x00000000049D1000-memory.dmp

              Filesize

              4KB

            • memory/4764-16-0x0000000004A30000-0x0000000004A31000-memory.dmp

              Filesize

              4KB

            • memory/4764-17-0x0000000004980000-0x0000000004981000-memory.dmp

              Filesize

              4KB

            • memory/4764-18-0x0000000004C10000-0x0000000004C12000-memory.dmp

              Filesize

              8KB

            • memory/4764-20-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

              Filesize

              4KB

            • memory/4764-19-0x0000000004A70000-0x0000000004A71000-memory.dmp

              Filesize

              4KB

            • memory/4764-21-0x00000000048D0000-0x00000000048D1000-memory.dmp

              Filesize

              4KB

            • memory/4764-22-0x0000000004990000-0x0000000004991000-memory.dmp

              Filesize

              4KB

            • memory/4764-23-0x0000000004A60000-0x0000000004A61000-memory.dmp

              Filesize

              4KB

            • memory/4764-24-0x0000000004A90000-0x0000000004A91000-memory.dmp

              Filesize

              4KB

            • memory/4764-25-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-26-0x0000000004A20000-0x0000000004A21000-memory.dmp

              Filesize

              4KB

            • memory/4764-27-0x00000000049F0000-0x00000000049F1000-memory.dmp

              Filesize

              4KB

            • memory/4764-28-0x0000000004A50000-0x0000000004A51000-memory.dmp

              Filesize

              4KB

            • memory/4764-29-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-30-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-31-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-32-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB

            • memory/4764-33-0x00000000049E0000-0x00000000049E1000-memory.dmp

              Filesize

              4KB

            • memory/4764-34-0x0000000000400000-0x0000000000811000-memory.dmp

              Filesize

              4.1MB