Analysis
-
max time kernel
134s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
4479b37295b978bc81b1edf547ebddf5
-
SHA1
d423944a9b7689c43d854b9ca084f6cc56ad2307
-
SHA256
8112636a60f6c618a55624cd8d6cdec6d6c70e834c7356ffaa6cc1742889228d
-
SHA512
589d1c28ccfe1cfeaa1eef5c11637232d4127b764189a37d9e1991686e362fa77a58c605581727bd1eb6a63ad82b99104df1f1c479823ffd183bde03043bdfdb
-
SSDEEP
24576:zub3zUtvDOFwUj+d/4UHLKNwa/SIA/rL4nyauwXtgUz/V+6JihK9P5/LvOYKe17l:zub3zUtvDMj0QUONwcAPQ15VJGkZ17XV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wg2028915592f.vps 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\wg2028915592f.vps\ = a08954e5abe02f4c4007e63ca52927a7 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2344 notepad.exe 2344 notepad.exe 2344 notepad.exe 2344 notepad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2344 2244 4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe 82 PID 2344 wrote to memory of 2244 2344 notepad.exe 81 PID 2344 wrote to memory of 2244 2344 notepad.exe 81 PID 2344 wrote to memory of 1780 2344 notepad.exe 83 PID 2344 wrote to memory of 1780 2344 notepad.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4479b37295b978bc81b1edf547ebddf5_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\Users\Admin\AppData\Local\muuEquuwjW\cfgi"3⤵PID:1780
-
-