Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
4347eafdcd295a05714d41efc28064eb
-
SHA1
cedee6230ac0c57683f45777226a1ccaff47058e
-
SHA256
0ef30e4a7e49d74a85b0e3239be5fe98a1654b6da32524cd8e7add3a309bee74
-
SHA512
92eb3ac48c6309d30a4189a9e5bf23f52f0e5d428593d67110c2bcf0efa224836e19d0927dbf1a00ade224e7b7bb7217ad50258cc47d29f6dfaf8a18f78c3260
-
SSDEEP
98304:S7EU81K5h3tw0GLlziLpcBKe7cj515qBegECrG:aEU81St2Zzi5bYB/i
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ server.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 server.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Wine server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 368 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 368 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4784 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4784 AUDIODG.EXE Token: 33 368 vlc.exe Token: SeIncBasePriorityPrivilege 368 vlc.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 368 vlc.exe 368 vlc.exe 368 vlc.exe 368 vlc.exe 368 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 368 vlc.exe 368 vlc.exe 368 vlc.exe 368 vlc.exe 368 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 368 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4900 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 87 PID 1508 wrote to memory of 4900 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 87 PID 1508 wrote to memory of 4900 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 87 PID 1508 wrote to memory of 368 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 88 PID 1508 wrote to memory of 368 1508 4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4900
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\17. Cesar e Alessandro - Eu Amo Meu Pinscher.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:368
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\4347eafdcd295a05714d41efc28064eb_JaffaCakes118.exe"1⤵
- Modifies registry class
PID:4180
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d13efa485248d8dd8b63599e473b3c93
SHA11ee550d3f9822a752f7ea44794dceff1a4feec5c
SHA256223b776acd5c48c286d0f0aaa62eb37ae4a95257f5c4c952e2fc437295ceb41b
SHA512c6f582247aedbb917b76c0f4e1984e0ec52d383d5322d03522afdcdc10034ae75973077610dbc2d5b641548f3e880b9357106b5d1a99b5ca9aedd5a07091a583
-
Filesize
896KB
MD5fda43e7828a682db1aa20937e6b87a66
SHA18dfad9ba9e3aa22d8147b95bbe813bff93c1c892
SHA256805013b887ab45861137a72d141ed21e7825d803d992bef006036a87f0859c37
SHA5128d7fc765bdeb10fc4c318154d2140ca581cec2fab43bc206cc5a104f539de3f6f2be47428c06132cc52468c30753e32860c3886b0a153fa9722c0316082157e4