Analysis
-
max time kernel
54s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe
-
Size
912KB
-
MD5
298ca76ec649340a879a6c0a432a577e
-
SHA1
137ad04cb146da87d30b571c84fe750351a82f4f
-
SHA256
f4a686237d802584967b4323d5eae5c9b3ae026e620fef17af2efdaff5388c7b
-
SHA512
25c8af3e49d9601dbdc124f5379e800aae3a993fb7e4a4eff8fed0a21be03c7ad49869587009b6d3dc0f26a348957486c132b53533dc2f01128d1d53d67b71ab
-
SSDEEP
24576:jIjiHJ/SHOx6UqtURjZnli5A/ORSXHuh2x5:Mjip/YO/qtURjZlaAA4Hu4x5
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC2F6D7-4EC2-F6D7-4EC2-F6D74EC2F6D7} 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC2F6D7-4EC2-F6D7-4EC2-F6D74EC2F6D7}\ = "IntDitherer Class" 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC2F6D7-4EC2-F6D7-4EC2-F6D74EC2F6D7}\InProcServer32 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC2F6D7-4EC2-F6D7-4EC2-F6D74EC2F6D7}\InProcServer32\ = "C:\\Windows\\SysWOW64\\mshtml.dll" 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC2F6D7-4EC2-F6D7-4EC2-F6D74EC2F6D7}\InProcServer32\ThreadingModel = "Apartment" 298ca76ec649340a879a6c0a432a577e_JaffaCakes118.exe