Analysis

  • max time kernel
    133s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 10:09

General

  • Target

    7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    7523097d99af3f83ede720c3c53ed3ae

  • SHA1

    b8b1eb24329d2dacd6a8e4cb38cf9487e2b4052b

  • SHA256

    58f516bca2180b9c4997a83fc135fb69acc4915f262633d4791bda7f601d351b

  • SHA512

    6ebb7abe068cdb326f85d1d19af079ec9acfd488d8323a10d9b946da2acd8b43e7a35fe5b8a747f1726b22bb41951c23804b929e6cba6618c0dfcea53688d3c2

  • SSDEEP

    49152:dTimGRSG0RM9+HSrSgzv3vXrzUnRQh7R0MWRTlw9HRGU:Ri42EyrSEv3v/xN0MWgxn

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C ping 127.0.0.1 -n 3 > nul &del "C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:4400
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4316,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:8
    1⤵
      PID:4628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp5294.tmp

      Filesize

      255KB

      MD5

      dc1ca475cc21e0e5df007b6d905d6af3

      SHA1

      a75843acac08b722db94b145b32872ba499229fc

      SHA256

      a71fcca8bfe2a274b9607c18904a583a5d63233977dc74fc4eaafe91666417f2

      SHA512

      73a4aab577c6f6e9b7e694c460d69f891ab27826f1bf14c6d433d0b2878e68cf5a87cd8330d657bb649af65a06c2cbb04d10ee791b7ebde22d68424cb3c82b2e

    • C:\Users\Admin\AppData\Local\Temp\tmp5295.tmp

      Filesize

      46KB

      MD5

      8f5942354d3809f865f9767eddf51314

      SHA1

      20be11c0d42fc0cef53931ea9152b55082d1a11e

      SHA256

      776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

      SHA512

      fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

    • C:\Users\Admin\AppData\Local\Temp\tmp52BA.tmp

      Filesize

      100KB

      MD5

      baa675ce4124ca3fc5033e2a2c53dbd1

      SHA1

      2dcc5513270c723fff6148dd2f8196081f83bb16

      SHA256

      22cc36f18e7df98e3c58cd6fce492688970d4a5d1fb1865e5749b76138cdd9f4

      SHA512

      047d4d9a7d415d5a4814acc42f9148c0de7ec34c5d53cc90cdcbb218406b343a3c5a1f5ec4cc3b8ccca6b7f08ed0115b7e568a5141e1335c2a2a6ed2682b45ec

    • C:\Users\Admin\AppData\Local\Temp\tmp5325.tmp

      Filesize

      37KB

      MD5

      bb48f715ba51aae047150fed114e00a7

      SHA1

      de6377da50f795b3ea85584325a8703bc011ba25

      SHA256

      e59452d6d72da0fbc1f7ea6516bb273cba0d9a0da4795271660021d6419b9487

      SHA512

      23493be3e403a4344769f32425665772e07632f73202ae503a4a17e152d4319b1196b317e1c664983b612e307811ecc9a3c112f456f0b5cb070441c24119e365

    • C:\Users\Admin\AppData\Local\Temp\tmp5326.tmp

      Filesize

      56KB

      MD5

      5be7f6f434724dfcc01e8b2b0e753bbe

      SHA1

      ef1078290de6b5700ff6e804a79beba16c99ba3e

      SHA256

      4064b300ca1a67a3086e1adb18001c0017384b8f84ff4c0e693858889cef2196

      SHA512

      3b470c3ad5be3dd7721548021a818034584bbd88237b1710ce52ac67e04126fff4592c02f5868ebda72f662ec8c5f7fc4d0a458f49fe5eb47e024a5c50935ee2

    • C:\Users\Admin\AppData\Local\Temp\tmp533C.tmp

      Filesize

      228KB

      MD5

      13884ff020a99ee23a59f4f9f855f3e3

      SHA1

      d69d9c491ff8c42ed1bb05693edbfa6aa571cb7e

      SHA256

      3efa47d5a493132e6f00afef7ee29e583f10d1022f98b99d021498e968eb9d9c

      SHA512

      2ab0190602ed47c63c0208ef04ba83fec765e47db14f114af7b5a02fdcdaed6d0ee3f7291ea5102d4dd8ae5e859063fc3c9f52c94b6bf23735e0f780b8c001de

    • memory/1632-13-0x0000000000EB0000-0x00000000013F4000-memory.dmp

      Filesize

      5.3MB

    • memory/1632-23-0x0000000008650000-0x00000000086EC000-memory.dmp

      Filesize

      624KB

    • memory/1632-11-0x0000000006050000-0x00000000060E2000-memory.dmp

      Filesize

      584KB

    • memory/1632-12-0x00000000066A0000-0x0000000006C44000-memory.dmp

      Filesize

      5.6MB

    • memory/1632-0-0x0000000000EB0000-0x00000000013F4000-memory.dmp

      Filesize

      5.3MB

    • memory/1632-14-0x0000000006E20000-0x0000000006FE2000-memory.dmp

      Filesize

      1.8MB

    • memory/1632-15-0x0000000007520000-0x0000000007A4C000-memory.dmp

      Filesize

      5.2MB

    • memory/1632-16-0x0000000006D80000-0x0000000006DE6000-memory.dmp

      Filesize

      408KB

    • memory/1632-17-0x0000000008560000-0x00000000085B0000-memory.dmp

      Filesize

      320KB

    • memory/1632-8-0x0000000005450000-0x000000000555A000-memory.dmp

      Filesize

      1.0MB

    • memory/1632-7-0x0000000005210000-0x000000000525C000-memory.dmp

      Filesize

      304KB

    • memory/1632-6-0x00000000051D0000-0x000000000520C000-memory.dmp

      Filesize

      240KB

    • memory/1632-5-0x0000000002FA0000-0x0000000002FB2000-memory.dmp

      Filesize

      72KB

    • memory/1632-4-0x0000000005890000-0x0000000005EA8000-memory.dmp

      Filesize

      6.1MB

    • memory/1632-3-0x0000000000EB0000-0x00000000013F4000-memory.dmp

      Filesize

      5.3MB

    • memory/1632-2-0x0000000000EB0000-0x00000000013F4000-memory.dmp

      Filesize

      5.3MB

    • memory/1632-245-0x0000000000EB0000-0x00000000013F4000-memory.dmp

      Filesize

      5.3MB