Analysis
-
max time kernel
129s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe
-
Size
7KB
-
MD5
192743556baa9697e8a6d35774f2cf2e
-
SHA1
29890d8e184b4635959ae312a5c1e18f48c61ad4
-
SHA256
0ee2d0a37d899b0993b0d5841e94b06dbc41c6a58182cf63d54f49964dff166b
-
SHA512
05b2bac31d8c9290eab625d484297de06dca7e9aa15cf2abeb9d3de5f573bcaebc7803d5a830f6c699b2696fb6f43f7bd9282e76aa99183aa8228fb55efc4a7c
-
SSDEEP
96:mzSmG6kHWjs891wQ2sSorvF5cE2TYlnlYJnLeL0Kff345CLv1r5RXmm6CBajF:mzFjs8PweSuwV2nlYJLeLTg4ln6CS
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 4668 dw20.exe Token: SeBackupPrivilege 4668 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4668 1232 192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe 83 PID 1232 wrote to memory of 4668 1232 192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\192743556baa9697e8a6d35774f2cf2e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7962⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4668
-