Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
77ab732257c72209115631b9aaafce2c
-
SHA1
fba263537547257cee21122da1681a7e53b7dc9c
-
SHA256
e4b2784782cceb1203f87cc4386fd69cca9782706a37babb3ae0f38310ec89e6
-
SHA512
c8ebbe6639fac0a0b01ff7fb4d644d545db07a34878389bfc45f741d983dc7298ae5c6f42fcef6bbe791bb00e61b56dc8e466564c385f91d50e1e7f2f093ff41
-
SSDEEP
98304:TsAsX0Kkoe1hb22UZ94wsNpxNnTPd9JG3EJGm0s:QAnThCH4wsNpbnzdMo0s
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9852291382.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9852291382.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9852291382.exe -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 9852291382.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine 9852291382.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9852291382.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 2116 9852291382.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9852291382.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9852291382.exe -
Kills process with taskkill 2 IoCs
pid Process 2028 taskkill.exe 2724 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe 2116 9852291382.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2724 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2116 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 28 PID 1848 wrote to memory of 2116 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 28 PID 1848 wrote to memory of 2116 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 28 PID 1848 wrote to memory of 2116 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 28 PID 1848 wrote to memory of 2652 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 29 PID 1848 wrote to memory of 2652 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 29 PID 1848 wrote to memory of 2652 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 29 PID 1848 wrote to memory of 2652 1848 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe 29 PID 2652 wrote to memory of 2724 2652 cmd.exe 31 PID 2652 wrote to memory of 2724 2652 cmd.exe 31 PID 2652 wrote to memory of 2724 2652 cmd.exe 31 PID 2652 wrote to memory of 2724 2652 cmd.exe 31 PID 2116 wrote to memory of 1596 2116 9852291382.exe 34 PID 2116 wrote to memory of 1596 2116 9852291382.exe 34 PID 2116 wrote to memory of 1596 2116 9852291382.exe 34 PID 2116 wrote to memory of 1596 2116 9852291382.exe 34 PID 1596 wrote to memory of 2028 1596 cmd.exe 36 PID 1596 wrote to memory of 2028 1596 cmd.exe 36 PID 1596 wrote to memory of 2028 1596 cmd.exe 36 PID 1596 wrote to memory of 2028 1596 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\ProgramData\Arkei-84f733b4-eea8-4063-a7fc-81d3a2fcb37c\9852291382.exe"C:\ProgramData\Arkei-84f733b4-eea8-4063-a7fc-81d3a2fcb37c\9852291382.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 9852291382.exe /f & erase C:\ProgramData\Arkei-84f733b4-eea8-4063-a7fc-81d3a2fcb37c\9852291382.exe & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 9852291382.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe /f & erase C:\Users\Admin\AppData\Local\Temp\77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 77ab732257c72209115631b9aaafce2c_JaffaCakes118.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556B
MD5846bc3f7f2e96f21838a3866efa7b3dd
SHA1ae5b2a8b1363a689df267685722bc0c9382e73d7
SHA2567725eb8e8e7a1455076d3cc36b4d263ebace73392d949312746a15c5e3ac253b
SHA51261cd5b38acf7a491c2ddbb1997126d3fb0222249396e2d5d88cc8593222d96616a1cb790fa9b999b534c05c09a05815f97171f094c64946cd4b336efd4500264
-
Filesize
3.7MB
MD577ab732257c72209115631b9aaafce2c
SHA1fba263537547257cee21122da1681a7e53b7dc9c
SHA256e4b2784782cceb1203f87cc4386fd69cca9782706a37babb3ae0f38310ec89e6
SHA512c8ebbe6639fac0a0b01ff7fb4d644d545db07a34878389bfc45f741d983dc7298ae5c6f42fcef6bbe791bb00e61b56dc8e466564c385f91d50e1e7f2f093ff41