Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
362073a5ce3273ad4dcfc8e6c47ec3ca
-
SHA1
7948c767c9d666b4fd73d7b6180c5fd78c302ac1
-
SHA256
e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f
-
SHA512
15d048fbb1ab5da75818a1ea21a1d7ed4f97b394281c677c7e7a08c1291cb514500ef3078ae358d1e1eb5c9bb294ebacf075f3b3b40631bce01c92d8f00c0377
-
SSDEEP
49152:niHexSQINK8mkzI+xNPfCH+CjIcZWzjR:niHfpNNMkpqHbIZ
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral1/memory/2868-3-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-4-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-5-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-6-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-7-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-8-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-9-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-10-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-11-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-12-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/2868-22-0x000000003F770000-0x000000003FBB6000-memory.dmp buer behavioral1/memory/1532-25-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-26-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-28-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-27-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-29-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-30-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-31-0x000000003F1D0000-0x000000003F616000-memory.dmp buer behavioral1/memory/1532-32-0x000000003F1D0000-0x000000003F616000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1532 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 1532 plugin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 1532 plugin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1532 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 30 PID 2868 wrote to memory of 1532 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 30 PID 2868 wrote to memory of 1532 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 30 PID 2868 wrote to memory of 1532 2868 362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\362073a5ce3273ad4dcfc8e6c47ec3ca_JaffaCakes118.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5362073a5ce3273ad4dcfc8e6c47ec3ca
SHA17948c767c9d666b4fd73d7b6180c5fd78c302ac1
SHA256e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f
SHA51215d048fbb1ab5da75818a1ea21a1d7ed4f97b394281c677c7e7a08c1291cb514500ef3078ae358d1e1eb5c9bb294ebacf075f3b3b40631bce01c92d8f00c0377