Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
22fff196938a30bb39ecc739eedc30d4
-
SHA1
a00dc6d0822a231336b522527dda7236f566f7cf
-
SHA256
42029d6d93e3501a7f21fa66a03c8bbbc7312961ed1d07882726e5d8978ea3e6
-
SHA512
0ee52b6dc6107508dd650d5c2419ddbeb78b145d95948c9ee672dcd55bcb8e3f791c0203b2e751e544e9e19d0c9abdc7ced8980451dd6ac24077581fe5a48d65
-
SSDEEP
24576:315Y+wfqKrvJJ2JNoVZcQPB6agExaw+ayWeAC9IqLs/:Wq0Kv1Qp6q0J9rAf+2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 Crack.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E4DF3F1-F946-7646-F946-7646F9467646}\InprocServer32 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E4DF3F1-F946-7646-F946-7646F9467646}\InprocServer32\ = "ole32.dll" 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E4DF3F1-F946-7646-F946-7646F9467646} 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E4DF3F1-F946-7646-F946-7646F9467646}\ = "PointerMoniker" 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2004 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2004 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2004 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2004 2564 22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22fff196938a30bb39ecc739eedc30d4_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Crack.exeC:\Users\Admin\AppData\Local\Temp\Crack.exe2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c3f30f359c69048f558f10099afc62f2
SHA114ba1c37658355341b4c1e3f43d4cdc0936e33da
SHA256fba1dbd8aff0907dde569e495dae39029532e867603be2086b8dd70869215746
SHA512232e29a271e68af8c7a6c1e919e00b7cde4424a97372efbc3a2ef80322afc59618d66800aba199db90cc93c33b4fef10d17a9d481762572a494e2bcec0922baa