General
-
Target
a6eb72786833e41037b692d54a08d64b_JaffaCakes118
-
Size
3.1MB
-
Sample
240613-2jae7axbkj
-
MD5
a6eb72786833e41037b692d54a08d64b
-
SHA1
209d8da4ba64ad038225b99bd2ae8d38eba63805
-
SHA256
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2
-
SHA512
69261858bb0aa897f5d80c40dbd66de905d347a94b72c98fd6fc6d1d6966d1cc4a2456aaa5a9b596b8a1109b66284bae89d01bbcfb2cb8c40bd2ac17a83cd193
-
SSDEEP
49152:Hs3dakSdDYG/RTi10rNdCvJOAcHgAlIZ3t61hAloK1Zlxv1yq1M8Il2jrY788GhY:HhdDE0rNdZrHgUIjQCowx/C5179GtQz
Static task
static1
Behavioral task
behavioral1
Sample
a6eb72786833e41037b692d54a08d64b_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
a6eb72786833e41037b692d54a08d64b_JaffaCakes118
-
Size
3.1MB
-
MD5
a6eb72786833e41037b692d54a08d64b
-
SHA1
209d8da4ba64ad038225b99bd2ae8d38eba63805
-
SHA256
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2
-
SHA512
69261858bb0aa897f5d80c40dbd66de905d347a94b72c98fd6fc6d1d6966d1cc4a2456aaa5a9b596b8a1109b66284bae89d01bbcfb2cb8c40bd2ac17a83cd193
-
SSDEEP
49152:Hs3dakSdDYG/RTi10rNdCvJOAcHgAlIZ3t61hAloK1Zlxv1yq1M8Il2jrY788GhY:HhdDE0rNdZrHgUIjQCowx/C5179GtQz
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2