Analysis
-
max time kernel
130s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe
-
Size
725KB
-
MD5
3ede7a2805a4698d1dcc25eb48e8eca0
-
SHA1
e579f1bda2ad449884e858f90c484563691a92cd
-
SHA256
d2c2eedbd19445c4837be5464f5988ddd0ade3417f5c1a082207b71c36192829
-
SHA512
9e3e4c1d99c90d567a711f8a7780dea9dfa6d9353b812ba351d963d9bc5d7cdc617b6368e93bd6551ac7755e134a6dbc21de0ab6793b2086db2f5ed216c5dabf
-
SSDEEP
12288:ekrKMCnflwZUO9DsgztGskdByuI5yV2aDF4yTMDyE1W2N7C:frK5flCUoDsgUnbeyb48F0nC
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 400 1348 WerFault.exe 82 5336 3328 WerFault.exe 91 5724 2252 WerFault.exe 90 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\ 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 2252 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 2252 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2252 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 90 PID 1348 wrote to memory of 2252 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 90 PID 1348 wrote to memory of 2252 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 90 PID 1348 wrote to memory of 3328 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 91 PID 1348 wrote to memory of 3328 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 91 PID 1348 wrote to memory of 3328 1348 3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 6882⤵
- Program crash
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exestart2⤵
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 6883⤵
- Program crash
PID:5724
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ede7a2805a4698d1dcc25eb48e8eca0_JaffaCakes118.exewatch2⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 6963⤵
- Program crash
PID:5336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1348 -ip 13481⤵PID:5224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3328 -ip 33281⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2252 -ip 22521⤵PID:2740