Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
5419b68e892537e2f02ed14c671e315f
-
SHA1
21c7e4899632b83776d1d86b406a76e60cc6f58d
-
SHA256
d0a1612ed72fa557c8dc8094b7536bf1e58c4dca0b0ee2dccd21f884644388a6
-
SHA512
e5929a4772821f39d30199d1af35a08ae3209445ef7203a617bec9ca48b8d71be2f2b8efb2315046a560d04c95d7d5b5029601d8d3cc89b4d4c8892af0f5f3ab
-
SSDEEP
49152:YTnwHus0g6cXW9DpUT3WzSmagomLoLWGwjlBLP72gbHYTno:8nwHu3ZeTGpaKsqvllP/4zo
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 3600 svchost.exe 3104 svchost.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine svchost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "C:\\ProgramData\\WindowsUpdate\\svchost.exe" 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "C:\\ProgramData\\WindowsUpdate\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "C:\\ProgramData\\WindowsUpdate\\svchost.exe" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 3600 svchost.exe 3104 svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 3600 svchost.exe 3600 svchost.exe 3104 svchost.exe 3104 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3600 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeShutdownPrivilege 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Token: SeDebugPrivilege 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Token: SeTcbPrivilege 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeDebugPrivilege 3600 svchost.exe Token: SeTcbPrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3104 svchost.exe Token: SeDebugPrivilege 3104 svchost.exe Token: SeTcbPrivilege 3104 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3600 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3600 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 82 PID 4624 wrote to memory of 3600 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 82 PID 4624 wrote to memory of 3600 4624 5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe 82 PID 3600 wrote to memory of 3104 3600 svchost.exe 83 PID 3600 wrote to memory of 3104 3600 svchost.exe 83 PID 3600 wrote to memory of 3104 3600 svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5419b68e892537e2f02ed14c671e315f_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\ProgramData\WindowsUpdate\svchost.exe"C:\ProgramData\WindowsUpdate\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\ProgramData\WindowsUpdate\svchost.exe"C:\ProgramData\WindowsUpdate\svchost.exe" 36003⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD55419b68e892537e2f02ed14c671e315f
SHA121c7e4899632b83776d1d86b406a76e60cc6f58d
SHA256d0a1612ed72fa557c8dc8094b7536bf1e58c4dca0b0ee2dccd21f884644388a6
SHA512e5929a4772821f39d30199d1af35a08ae3209445ef7203a617bec9ca48b8d71be2f2b8efb2315046a560d04c95d7d5b5029601d8d3cc89b4d4c8892af0f5f3ab