Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
3afafe2de45b8c05b0b43e13c9a908fa
-
SHA1
b6fbe28befacb712ac9012d08c8a3082af304e7a
-
SHA256
8b056ff17d3e71a3f7abd1b347c3dd1b47dea7b4a794f27bf18448c34219939c
-
SHA512
43be6959577b6901e57de9eb8f1794fd4318161e3ff0f35978488685281d3e8572e0781a67a64f44989117984a24820ead01af75825940e07055463d1d67c66d
-
SSDEEP
24576:WTnaD32wRuuGSSQgy2t6TrwgLv5maFqqg6e+AEDhUFiniA+p8muKOzTF7AJTv:WTJSc6TVTDg67Q5A+34zTF7AJD
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2220 2416 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2220 2416 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2220 2416 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2220 2416 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2220 2416 3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3afafe2de45b8c05b0b43e13c9a908fa_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 5602⤵
- Program crash
PID:2220
-