Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
a1c86dc81df8c629410fa9970423016e
-
SHA1
96bd00b2a79f00112e5f911019f140c95db19334
-
SHA256
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
-
SHA512
250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f
-
SSDEEP
24576:f/y+xFOvI0vRcEg3QkQko24/NRwGi6oUrrke2RfhtTb8NO64tVaU/HpKINiC4tEr:C+xKFRM2Juf2OX6OftVaU/JNiNtE
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1744-2-0x000000003FF61000-0x000000003FF66000-memory.dmp buer behavioral1/memory/1744-3-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-4-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-5-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-6-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-7-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-8-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-9-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/1744-14-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-20-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-21-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-22-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-23-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-24-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-25-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-26-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-28-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-29-0x000000003FF60000-0x0000000040442000-memory.dmp buer behavioral1/memory/2440-30-0x000000003FF60000-0x0000000040442000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 2440 errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 2440 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 2440 errorResponder.exe 2440 errorResponder.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 1744 wrote to memory of 2440 1744 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 30 PID 2440 wrote to memory of 900 2440 errorResponder.exe 31 PID 2440 wrote to memory of 900 2440 errorResponder.exe 31 PID 2440 wrote to memory of 900 2440 errorResponder.exe 31 PID 2440 wrote to memory of 900 2440 errorResponder.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a1c86dc81df8c629410fa9970423016e
SHA196bd00b2a79f00112e5f911019f140c95db19334
SHA2564ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
SHA512250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f