Analysis Overview
SHA256
a459ae8ff0c5a68bb41a5690433c33e11a38798e34662a6d77950c6ea3e6c5c7
Threat Level: Known bad
The file fc6f5710617da1b8662391639005484e_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Checks BIOS information in registry
Unsigned PE
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-20 09:24
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-20 09:24
Reported
2024-04-20 09:26
Platform
win7-20240221-en
Max time kernel
117s
Max time network
121s
Command Line
Signatures
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\Server | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mscoree.dll" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\ProgID | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\VersionIndependentProgID | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\ = "Microsoft Common Language Runtime Debugger Publisher" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InprocServer32\ThreadingModel = "Both" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InprocServer32\2.0.50727 | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InprocServer32\2.0.50727\ImplementedInThisVersion | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\NotInsertable | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\ProgID\ = "ComPlusDebug.CorpubPublish.1" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\VersionIndependentProgID\ = "ComPlusDebug.CorpubPublish" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F} | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\Server\ = "mscordbi.dll" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe"
Network
Files
memory/2856-0-0x0000000000400000-0x000000000070C000-memory.dmp
memory/2856-1-0x00000000030A0000-0x00000000032AC000-memory.dmp
memory/2856-8-0x00000000030A0000-0x00000000032AC000-memory.dmp
memory/2856-11-0x0000000000400000-0x000000000070C000-memory.dmp
memory/2856-12-0x00000000030A0000-0x00000000032AC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-20 09:24
Reported
2024-04-20 09:26
Platform
win10v2004-20240412-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F} | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\ = "CommonLayoutModifier" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InProcServer32 | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EDC71B7-9A3D-296F-9A3D-296F9A3D296F}\InProcServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\fc6f5710617da1b8662391639005484e_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| NL | 23.62.61.72:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 72.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.173.246.72.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.139.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 66.112.168.52.in-addr.arpa | udp |
| BE | 23.14.90.73:80 | tcp |
Files
memory/1020-0-0x0000000000400000-0x000000000070C000-memory.dmp
memory/1020-2-0x00000000049E0000-0x0000000004BEC000-memory.dmp
memory/1020-9-0x00000000049E0000-0x0000000004BEC000-memory.dmp
memory/1020-8-0x00000000049E0000-0x0000000004BEC000-memory.dmp
memory/1020-12-0x0000000000400000-0x000000000070C000-memory.dmp
memory/1020-13-0x00000000049E0000-0x0000000004BEC000-memory.dmp