Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe
-
Size
79KB
-
MD5
2b5ae11e52244db3aa2ce507db68e747
-
SHA1
c35620ebf0e3c41b8851a8eb7f13c9e26a14a764
-
SHA256
412a4539502b7577f57e3a42c10738fb4d7bd3c6581129dd452da20e817a0f1a
-
SHA512
be0a22a0a3a26fb0dd49c688d9f9560699b5f32dc213781bb6b2fc42909df9b2f7173ce0b500bf4a22d9d0360727e15b267368639729dada23d3cfc6bb1f4c07
-
SSDEEP
1536:tZlDZ/rPNiONuOoFh3uXz1hgU9Evkc/EjisEn/0iVvPpQ1n/:nzhHoFh+X39lixn/0iNe
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2800 set thread context of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 1632 svchost.exe 1632 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 PID 2800 wrote to memory of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 PID 2800 wrote to memory of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 PID 2800 wrote to memory of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 PID 2800 wrote to memory of 1632 2800 2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe 82 PID 1632 wrote to memory of 4548 1632 svchost.exe 84 PID 1632 wrote to memory of 4548 1632 svchost.exe 84 PID 1632 wrote to memory of 4548 1632 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\2b5ae11e52244db3aa2ce507db68e747_JaffaCakes118.exe")3⤵PID:4548
-
-