Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
7523097d99af3f83ede720c3c53ed3ae
-
SHA1
b8b1eb24329d2dacd6a8e4cb38cf9487e2b4052b
-
SHA256
58f516bca2180b9c4997a83fc135fb69acc4915f262633d4791bda7f601d351b
-
SHA512
6ebb7abe068cdb326f85d1d19af079ec9acfd488d8323a10d9b946da2acd8b43e7a35fe5b8a747f1726b22bb41951c23804b929e6cba6618c0dfcea53688d3c2
-
SSDEEP
49152:dTimGRSG0RM9+HSrSgzv3vXrzUnRQh7R0MWRTlw9HRGU:Ri42EyrSEv3v/xN0MWgxn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 checkip.amazonaws.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4400 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3636 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 106 PID 1632 wrote to memory of 3636 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 106 PID 1632 wrote to memory of 3636 1632 7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe 106 PID 3636 wrote to memory of 4400 3636 cmd.exe 108 PID 3636 wrote to memory of 4400 3636 cmd.exe 108 PID 3636 wrote to memory of 4400 3636 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul &del "C:\Users\Admin\AppData\Local\Temp\7523097d99af3f83ede720c3c53ed3ae_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:4400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4316,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5dc1ca475cc21e0e5df007b6d905d6af3
SHA1a75843acac08b722db94b145b32872ba499229fc
SHA256a71fcca8bfe2a274b9607c18904a583a5d63233977dc74fc4eaafe91666417f2
SHA51273a4aab577c6f6e9b7e694c460d69f891ab27826f1bf14c6d433d0b2878e68cf5a87cd8330d657bb649af65a06c2cbb04d10ee791b7ebde22d68424cb3c82b2e
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
100KB
MD5baa675ce4124ca3fc5033e2a2c53dbd1
SHA12dcc5513270c723fff6148dd2f8196081f83bb16
SHA25622cc36f18e7df98e3c58cd6fce492688970d4a5d1fb1865e5749b76138cdd9f4
SHA512047d4d9a7d415d5a4814acc42f9148c0de7ec34c5d53cc90cdcbb218406b343a3c5a1f5ec4cc3b8ccca6b7f08ed0115b7e568a5141e1335c2a2a6ed2682b45ec
-
Filesize
37KB
MD5bb48f715ba51aae047150fed114e00a7
SHA1de6377da50f795b3ea85584325a8703bc011ba25
SHA256e59452d6d72da0fbc1f7ea6516bb273cba0d9a0da4795271660021d6419b9487
SHA51223493be3e403a4344769f32425665772e07632f73202ae503a4a17e152d4319b1196b317e1c664983b612e307811ecc9a3c112f456f0b5cb070441c24119e365
-
Filesize
56KB
MD55be7f6f434724dfcc01e8b2b0e753bbe
SHA1ef1078290de6b5700ff6e804a79beba16c99ba3e
SHA2564064b300ca1a67a3086e1adb18001c0017384b8f84ff4c0e693858889cef2196
SHA5123b470c3ad5be3dd7721548021a818034584bbd88237b1710ce52ac67e04126fff4592c02f5868ebda72f662ec8c5f7fc4d0a458f49fe5eb47e024a5c50935ee2
-
Filesize
228KB
MD513884ff020a99ee23a59f4f9f855f3e3
SHA1d69d9c491ff8c42ed1bb05693edbfa6aa571cb7e
SHA2563efa47d5a493132e6f00afef7ee29e583f10d1022f98b99d021498e968eb9d9c
SHA5122ab0190602ed47c63c0208ef04ba83fec765e47db14f114af7b5a02fdcdaed6d0ee3f7291ea5102d4dd8ae5e859063fc3c9f52c94b6bf23735e0f780b8c001de