Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
30463df4b729bfab25383b9cff41e90c
-
SHA1
3c8eb2138a3d256f4198b0bf8ec0f17b1e4f7b5c
-
SHA256
c166b001da3f350bf82b07bd66d5900fb35220778b8c4db388e80a1352183cf4
-
SHA512
e91f16a50a890e4a1552f018373ddc268faa26502cd2a7d166deff75ec7f08e0240d808a03506b4ada023b5b1799a38dce1f71ddbf9f71c55bd22f0307aafa1b
-
SSDEEP
24576:HGuOe3ojhhxFE1wLVzeCJSU/ecV7sD+qfFt74vutFoI9Wl0:HQe3oPsR85VmDt7kuzFa
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D0E164C-1C7A-2418-4D8D-1993EA55F31C} 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D0E164C-1C7A-2418-4D8D-1993EA55F31C}\ = "Registry Data Driven Command" 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D0E164C-1C7A-2418-4D8D-1993EA55F31C}\InProcServer32 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D0E164C-1C7A-2418-4D8D-1993EA55F31C}\InProcServer32\ = "%SystemRoot%\\SysWow64\\windows.storage.dll" 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D0E164C-1C7A-2418-4D8D-1993EA55F31C}\InProcServer32\ThreadingModel = "Apartment" 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Token: 33 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 516 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3952 wrote to memory of 516 3952 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 84 PID 3952 wrote to memory of 516 3952 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 84 PID 3952 wrote to memory of 516 3952 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 84 PID 3952 wrote to memory of 516 3952 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 84 PID 3952 wrote to memory of 516 3952 30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30463df4b729bfab25383b9cff41e90c_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383B
MD553056027c95ac77f00d5cb0a05da50cc
SHA188a5f4f02a6a3c6ba47e0d8f7ba577d8a8cab048
SHA25622b8a3d4c8361cddf8b4bd6baa66a3c3656fc261d3d673735e7dc5156aa95052
SHA512cdadb37f1824a9e775b217d42cf848e42c2b57d0fe60717a05066e54af032f8e6e2537680bd56bc2fb289a34be630f15da5dcb08990f5528bab738aa56db10ce
-
Filesize
1KB
MD52b38c048d8bf8282324d9ac69fb126ea
SHA1d992ae65abd679cd41876ae496b93e8c038e5e5f
SHA256933fabaa90bc542df0b598754dc327dbbd493ec3c242fea65a5a429adbd384e9
SHA512a24b637d640d25815fa20887d6c4e982677133aaca658e38859549e79a12ee3f0c9d13ead23deb52d178b60a605a3c4b693a24810a233c7787b9911e626c4e4c
-
Filesize
5KB
MD5084d63d57d31aa303e74a3e1d430c1db
SHA183ae71532d59eae3adfb6578bebe1de69a4c76f4
SHA25682d913facab349d59bfa8fa6423b55de4741cd59b08757fa2931f3e619e336b9
SHA5123c4db71d25e9dec26360633a024f090aa75c8566d3e8b40fb82aec7b28892c37c55bdeb082b38019acae28163bca43b189544a0281190cd19a196dbf10a8af41