Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
1ada622e8a800409684a951f3f3153a5
-
SHA1
0563dc8321ded1b62aaae37a8320b4fce86c703c
-
SHA256
742d689ec60e34f25c533305888fde480c54fa156527b31f2ef0da7296c8be3c
-
SHA512
402ad58890608fa555547a84b56d4d2e489c5c822571c39bedae736055e61c9aa0471a0d8d208e1d05b7fdbbc54306af832d6f54aed0419635dca708ae611c77
-
SSDEEP
98304:9D4MycvG5b53ng42tmqUyxO6Ibcfc7bvdrObig0Fqe9ur98r:xLi7QO6IS2BObd0F0O
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\Arquivos de programas\\win.exe" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reg_0001.txt 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\RuntimeVersion = "v2.0.50727" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\15.0.0.0\Class = "Microsoft.Vbe.Interop.ReferencesClass" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\15.0.0.0\RuntimeVersion = "v2.0.50727" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF} 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\Assembly = "Microsoft.Vbe.Interop, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\Class = "Microsoft.Vbe.Interop.ReferencesClass" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\15.0.0.0 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InprocServer32\15.0.0.0\Assembly = "Microsoft.Vbe.Interop, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\ProgramData\TEMP:BEEA8369 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe File created C:\ProgramData\TEMP:BEEA8369 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3364 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3364 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3364 1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ada622e8a800409684a951f3f3153a5_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4264 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:408