Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
4c0ae8c54d1e8244637a3c3b6dfad072_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c0ae8c54d1e8244637a3c3b6dfad072_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
4c0ae8c54d1e8244637a3c3b6dfad072_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
4c0ae8c54d1e8244637a3c3b6dfad072
-
SHA1
fcf4de60a8518fb3a879b8ccb0854b98889ac06c
-
SHA256
d34e2ce778253b852a68ad0491a4b51d119b2fae177c3cf25ff26e2603c0355a
-
SHA512
06f0cd4d5afbacabc5a655a18342619880faea1b6fd302a6bbf232c7291ff5dcc4f9431e8763af624039d66d4f417fdfa57285869ac658e1d8aa095df55c2332
-
SSDEEP
24576:Gvd0pQjnKbMgC0ABRn7ekbIFooXo7fg4aqnO/+6iH+KPLs4mLmvg5ZDWpi:G1tGvCvRn74FnXQpHOGieemvKB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4248 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3652 4248 WerFault.exe 82 2700 4248 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 rundll32.exe 4248 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4248 2760 rundll32.exe 82 PID 2760 wrote to memory of 4248 2760 rundll32.exe 82 PID 2760 wrote to memory of 4248 2760 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c0ae8c54d1e8244637a3c3b6dfad072_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c0ae8c54d1e8244637a3c3b6dfad072_JaffaCakes118.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6763⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 9203⤵
- Program crash
PID:2700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4248 -ip 42481⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4248 -ip 42481⤵PID:2080