Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
bc5f98244b9660c80608b0d7446178af
-
SHA1
09f7b612fbfc0deda614a77a9a349cba6bbc43f7
-
SHA256
7183fb2afc304db26b762a3f0b8341e62641b199a476edc1b8dfed76eaaa24e9
-
SHA512
4b6df1c859d2b2497e8277f23fb96a72fa50a4878a7a40c8e669860272a9fe108abb6f9381b43ff24e0ffccfe55b9280770b0ea4fe06f7710071ec2bff48496f
-
SSDEEP
24576:MmGNugfg2yU77fK8Jd6PtauRlEtjycFen4Ed7ztARHhM2O3aTjG/ud3+yoBAvjA:MmWuagrEF8Ptxgjre4EN5AHg32dvjA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lsm.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lsm.exe -
Executes dropped EXE 3 IoCs
pid Process 2212 lsm.exe 836 lsm.exe 2204 lsm.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine lsm.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine lsm.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine lsm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 iplogger.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 2212 lsm.exe 836 lsm.exe 2204 lsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 2212 lsm.exe 836 lsm.exe 2204 lsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2884 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2884 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2884 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2884 2360 bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe 28 PID 2952 wrote to memory of 2212 2952 taskeng.exe 32 PID 2952 wrote to memory of 2212 2952 taskeng.exe 32 PID 2952 wrote to memory of 2212 2952 taskeng.exe 32 PID 2952 wrote to memory of 2212 2952 taskeng.exe 32 PID 2952 wrote to memory of 836 2952 taskeng.exe 35 PID 2952 wrote to memory of 836 2952 taskeng.exe 35 PID 2952 wrote to memory of 836 2952 taskeng.exe 35 PID 2952 wrote to memory of 836 2952 taskeng.exe 35 PID 2952 wrote to memory of 2204 2952 taskeng.exe 36 PID 2952 wrote to memory of 2204 2952 taskeng.exe 36 PID 2952 wrote to memory of 2204 2952 taskeng.exe 36 PID 2952 wrote to memory of 2204 2952 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc5f98244b9660c80608b0d7446178af_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /f /tn "Microsoft LocalManager[Windows 7 Ultimate]" /tr "C:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {545BBF4D-698C-4C36-8A61-8B064344AA55} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exeC:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exeC:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exeC:\ProgramData\{81987871-8198-8198-819878719743}\lsm.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5bc5f98244b9660c80608b0d7446178af
SHA109f7b612fbfc0deda614a77a9a349cba6bbc43f7
SHA2567183fb2afc304db26b762a3f0b8341e62641b199a476edc1b8dfed76eaaa24e9
SHA5124b6df1c859d2b2497e8277f23fb96a72fa50a4878a7a40c8e669860272a9fe108abb6f9381b43ff24e0ffccfe55b9280770b0ea4fe06f7710071ec2bff48496f