Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 09:24

General

  • Target

    fc6f5710617da1b8662391639005484e_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    fc6f5710617da1b8662391639005484e

  • SHA1

    374cbdc4d919b2f8eb12926d62f10f36b5012d44

  • SHA256

    a459ae8ff0c5a68bb41a5690433c33e11a38798e34662a6d77950c6ea3e6c5c7

  • SHA512

    9a685d225675cee3ae1707dab3ee1700bff0157d32bf5136b76602e366144e8d3f6f069ff59f7b671f273f944af928b195421b835f1668b512400921dfc52416

  • SSDEEP

    49152:kyoR6FDbTpKIYYvlTPSZq1yFtMyMpy7Rk47JKyAWkkP:kDAFv1KImq18PWGR0yAWZ

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Modifies registry class
    PID:1020

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-0-0x0000000000400000-0x000000000070C000-memory.dmp
    Filesize

    3.0MB

  • memory/1020-2-0x00000000049E0000-0x0000000004BEC000-memory.dmp
    Filesize

    2.0MB

  • memory/1020-9-0x00000000049E0000-0x0000000004BEC000-memory.dmp
    Filesize

    2.0MB

  • memory/1020-8-0x00000000049E0000-0x0000000004BEC000-memory.dmp
    Filesize

    2.0MB

  • memory/1020-12-0x0000000000400000-0x000000000070C000-memory.dmp
    Filesize

    3.0MB

  • memory/1020-13-0x00000000049E0000-0x0000000004BEC000-memory.dmp
    Filesize

    2.0MB