Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe
-
Size
588KB
-
MD5
0ceeddad6a44ed3991d84b4ec7243200
-
SHA1
42d9287608774bd711255eb0d5507c548dd97ad1
-
SHA256
43ffe045cfbf5729249d24b9acd7d4b4abea94b257075f54db0e66a436ff9755
-
SHA512
a39a0c310d0b3ccf8db7e705d1e83a2291223cf9e86bc79953043a89ae3f3b0f84162799ec94b40ed95ec5c2f96eb3f1b80b83ccdba40e9ad4f806620ff01c70
-
SSDEEP
12288:GXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7jH:3gIh0/iLhrekeKYAl4RNH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5100 set thread context of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 5008 3884 WerFault.exe 85 2848 3884 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3884 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 3884 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 3884 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 3884 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 3884 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85 PID 5100 wrote to memory of 3884 5100 0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ceeddad6a44ed3991d84b4ec7243200_JaffaCakes118.exe" Track="0001000000"2⤵
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 20763⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 20243⤵
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3884 -ip 38841⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3884 -ip 38841⤵PID:2316