Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
299387006f4c53e094801accf2038d6a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
299387006f4c53e094801accf2038d6a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
299387006f4c53e094801accf2038d6a_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
299387006f4c53e094801accf2038d6a
-
SHA1
0ce470db13b5c568d93bcb835ea62713d39dd729
-
SHA256
6f3bc83cebfbca55ab91273f3e30fe64c628a4965fce526ef4e08241568111ff
-
SHA512
6bbf0698a13f453d7c518f4b06b839b818fb533d5894ceae0d4105533150741909e629236e43af8faa21df1f631dd3b889b14f8ac9ab7a5241362530bf58b083
-
SSDEEP
49152:cQTyG5ypIdlm8tJDl1r9ouchzJEzRkRfxxw5mX6AXJANerZA:etpIdA8biuwzokRfj4mX6mA8d
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:\\Windows\\FrWall.exe" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe -
Kills process with taskkill 1 IoCs
pid Process 6120 taskkill.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\command\ = "cmd.exe /s /k pushd \"%V\"" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InProcServer32 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\Extended 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\command 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\ShellFolder 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InProcServer32\ = "%SystemRoot%\\SysWow64\\windows.storage.dll" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\ = "@shell32.dll,-8506" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\NeverDefault 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF} 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\ = "Desktop" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\InProcServer32\ThreadingModel = "Apartment" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\shell\cmd\NoWorkingDirectory 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C855C0FB-69D6-4DD3-104F-A2AE88A136BF}\ShellFolder\FolderValueFlags = "1572864" 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BEEA8369 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:BEEA8369 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Token: SeDebugPrivilege 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe Token: SeDebugPrivilege 6120 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1192 wrote to memory of 6120 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe 85 PID 1192 wrote to memory of 6120 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe 85 PID 1192 wrote to memory of 6120 1192 299387006f4c53e094801accf2038d6a_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\299387006f4c53e094801accf2038d6a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\299387006f4c53e094801accf2038d6a_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Modifies registry class
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ashMaiSv.exe -im mcvsftsn.exe -im Mcdetect.exe -im McTskshd.exe -im mcvsshld.exe -im McVSEscn.exe -im McShield.exe -im mcagent.exe -im oasclnt.exe -im nod32kui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6120
-