Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe
-
Size
815KB
-
MD5
40688d57a661fd9fb32ef00b760777d2
-
SHA1
c6bffc1e1d1416357017d38ff9a2bc04d87ce125
-
SHA256
0b6d15238b5a7e3d580e24871495019c2186149b3d7dbe2d9bf0668ed50749d0
-
SHA512
990e1004d488fabf0b0b72172f1bf1f41c6df48277703f363f891ad21bef8de6a9ad8fa69f53c55825d16df68eabcc0896319d2cde7d670c312d252cf5cbf5e5
-
SSDEEP
12288:IE3YeiDFvZrO2tN/x2Gy7+5dmhMsiHAmZ6QG9WIBwXwprnkFtEI4IAH43PorUPnV:cvI2RryuLjZMWuw0rka4/o4SNid
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ znaxxx.exe -
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 znaxxx.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA znaxxx.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\znaxxx.exe 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\znaxxx.exe 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 2696 znaxxx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 2696 znaxxx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2628 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2628 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2628 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2628 2672 40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40688d57a661fd9fb32ef00b760777d2_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\40688D~1.EXE > nul2⤵
- Deletes itself
PID:2628
-
-
C:\Windows\SysWOW64\znaxxx.exeC:\Windows\SysWOW64\znaxxx.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
815KB
MD540688d57a661fd9fb32ef00b760777d2
SHA1c6bffc1e1d1416357017d38ff9a2bc04d87ce125
SHA2560b6d15238b5a7e3d580e24871495019c2186149b3d7dbe2d9bf0668ed50749d0
SHA512990e1004d488fabf0b0b72172f1bf1f41c6df48277703f363f891ad21bef8de6a9ad8fa69f53c55825d16df68eabcc0896319d2cde7d670c312d252cf5cbf5e5