Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe
-
Size
703KB
-
MD5
68dc72d37c92763e4cbd77a610ae7168
-
SHA1
905ad048e19033897e63734e92b3c26b1bd10620
-
SHA256
08c992190ae42209be3944b1b85bdf2218c803a0950e922e33ae3f473f293d8e
-
SHA512
4de2f168abcbbe4c1efa8c85d8e0c37a564ce9103ca44dd4aab0b59531d2fc0b12a596df1ea9bb8a66709b1a74ad12a4bed90900ec2dcc2ad268078d40b9468d
-
SSDEEP
12288:hHgLxi7Ma55+pDZIWcZWO5RgbdtK15LRCxg1RHeDpMgv4t1goX86rV:hHMiAe5aIWiFHktK7eDpMgvO11M6rV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exedescription pid process target process PID 2004 set thread context of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe -
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exepid process 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 2576 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exedescription pid process target process PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe PID 2004 wrote to memory of 2576 2004 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe 68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68dc72d37c92763e4cbd77a610ae7168_JaffaCakes118.exe" Track="0001001000"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-