Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
-
Size
660KB
-
MD5
3c55af3c92b682b83773ef3a99281f7c
-
SHA1
2ae250bd641fee2cb6736da37a1a329ac2f0bbd9
-
SHA256
73c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830
-
SHA512
935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950
-
SSDEEP
12288:rkoICAa5jUPa9ZDNNSBZpkJqRl7k86fpgBDDJrS7LE9HTFIUYVRSs5KHwY:IoICAsjVRmsJS7kF6lDJqLGT4RSsk
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 2640 rundll32.exe 2616 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "rundll32.exe" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rundll32.exe 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File created C:\Windows\rundll32.exe 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32\ = "%systemroot%\\SysWow64\\clbcatq.dll" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32\ThreadingModel = "Both" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770} 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\ = "Microsoft COM+ Services Meta Data" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData\TEMP:A7E78C07 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:A7E78C07 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:A7E78C07 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: 33 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: 33 2616 rundll32.exe Token: SeIncBasePriorityPrivilege 2616 rundll32.exe Token: 33 2616 rundll32.exe Token: SeIncBasePriorityPrivilege 2616 rundll32.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2880 2864 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2640 2880 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32 PID 2640 wrote to memory of 2616 2640 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD54bab2c3753efad198e01283d8a72d02f
SHA1a2ca129b3869916463fe6ca1a451f10488720de5
SHA25619b072eb0574041646b4960aebf15cba0817f89497d1275bd1e3607866d3d907
SHA5120dfada4e375387418ed52fc0c289bb64ca7fb82e744f3444c37312a92da6289af4ee7d3efc23884a30dcbe4fe9c163dc9d2e634cd4c8d9a9e6966bc2ccfd892f
-
Filesize
660KB
MD53c55af3c92b682b83773ef3a99281f7c
SHA12ae250bd641fee2cb6736da37a1a329ac2f0bbd9
SHA25673c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830
SHA512935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950