Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
a1c86dc81df8c629410fa9970423016e
-
SHA1
96bd00b2a79f00112e5f911019f140c95db19334
-
SHA256
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
-
SHA512
250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f
-
SSDEEP
24576:f/y+xFOvI0vRcEg3QkQko24/NRwGi6oUrrke2RfhtTb8NO64tVaU/HpKINiC4tEr:C+xKFRM2Juf2OX6OftVaU/JNiNtE
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/4276-2-0x000000003F9B1000-0x000000003F9B6000-memory.dmp buer behavioral2/memory/4276-3-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-4-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-5-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-6-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-7-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-8-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-9-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4276-14-0x000000003F9B0000-0x000000003FE92000-memory.dmp buer behavioral2/memory/4856-17-0x000000003FEE1000-0x000000003FEE6000-memory.dmp buer behavioral2/memory/4856-18-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-19-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-20-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-21-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-22-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-23-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-25-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-29-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer behavioral2/memory/4856-30-0x000000003FEE0000-0x00000000403C2000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 4856 errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 4856 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3848 4100 WerFault.exe 89 2400 4100 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 4856 errorResponder.exe 4856 errorResponder.exe 4856 errorResponder.exe 4856 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4856 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 88 PID 4276 wrote to memory of 4856 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 88 PID 4276 wrote to memory of 4856 4276 a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe 88 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89 PID 4856 wrote to memory of 4100 4856 errorResponder.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\a1c86dc81df8c629410fa9970423016e_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 2804⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 2884⤵
- Program crash
PID:2400
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 41001⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4100 -ip 41001⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a1c86dc81df8c629410fa9970423016e
SHA196bd00b2a79f00112e5f911019f140c95db19334
SHA2564ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
SHA512250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f