Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe
-
Size
872KB
-
MD5
4bc38e7b269dd41239c37ed8f415a279
-
SHA1
d1e71df4bf45a003663aa5c03a407f39cce95c17
-
SHA256
b5ff285ccf8b44a0390ba48925ef0ca797e17b59521065ee0dcb3d54bd2249c3
-
SHA512
936f73bbc2394b12d3d56148472a3f66991ddc5048e2771447c834b278de57d64ebde8c8f7782392bbfd1f7a2df5fdb732bb751f9b1c27f4fbf21a89c4590f69
-
SSDEEP
24576:w1UJlYxgTGC540pM6fGdMUmlQ0l11T/Wh0HCmeI:J9EslHT+h0imj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 test.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Wine 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe -
Loads dropped DLL 51 IoCs
pid Process 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe 2764 test.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\test.exe 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 test.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 test.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 test.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 test.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 test.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2764 1516 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe 33 PID 1516 wrote to memory of 2764 1516 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe 33 PID 1516 wrote to memory of 2764 1516 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe 33 PID 1516 wrote to memory of 2764 1516 4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\test.exeC:/Windows/test.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.8MB
MD5f64d6c038403367a03396e3438fcdb37
SHA13382664d84d896182a9f70fdfcbba47925d3ef3a
SHA256e9538796a9a9d05814c29166e546b56f5fa5213db8d9ec92b35f3f5abeec05a5
SHA512e1950d27512b1e29fe9caf2361449cdad585cba1ec3fb31d6ed543f31b2d7abae94bb15f8b536ce1a3566d4e7f5ff17426f6d41687ccdfc09fe332bc71a57f9b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD53f84f802f9e0a29fc4a161a7d71e24bb
SHA15b184658ebc39497933d22a74ea67ea31308168d
SHA256c2337dcab87e468e14454d745ea4370ab67bb456742c1a4f39c7f7e4c14a22f3
SHA5123ae65143109358f831301816ce33acbd7b436cfcfbeb1b956a03b633861bf2be8fdab77a30d5d18b1d0aabbfac18c8ee0e1182beefd0001b4bb8aed93bdfc1e3
-
Filesize
30.9MB
MD529b47d2508ba1fc815aa504c2783d567
SHA1f30c46c3cc53e6b30b3a538be142317ebf686414
SHA256120888f547a36a3de7649f852a7df4f2022e2342a9d7f2c409ce579c2ea305b7
SHA512e999e8999e4ad26553ce7020876c1c8b4b7c4e8ed5b97eae2bb76429a86b8efe9c985ccc8d7b15cf6a949071d24db3b5566dd26269a486873b99d64453aad734
-
Filesize
97KB
MD54a8178519a84a5aefd06c9c720360c69
SHA1d3598a9dee27879889b7ba3f3abe218586f11917
SHA256fdd180c2c1006d1538bae0e968d24ae70f7386f30b42e13e9cf45a48d1b0bbc0
SHA512967579323f7286fd3fa4f3c7f259ed9fccb63a8aa6fd2647fb8e2725c4d968b2fe2746a517078866393143d85c352e29a160b04a594f1b950d8918fa530655c8
-
Filesize
268KB
MD55ab783060397099771eda0284ef3d453
SHA109a8c6ec492c1e59ec6e837121ee50b5f45b882f
SHA256eed69ac3a08e2e989dfc06f2b8e18153f3be94407dd8e7eeb69be6c067a67de3
SHA512bc800c35f6067c2a470c041d2c44ec7363686b496e0c332bab8e62f030dc3502b3dd29156ef0228b2afa311aa8b5572ed95df1a1b62d4be3f9b01b581e038d5d
-
Filesize
3KB
MD5cfe0ac822ed2c3598de87fe3931c92a0
SHA10c603bdf81abe835621f29acd5ab2a67e670e762
SHA256df2f6d3c9de979dbde3aa3cf0633fc8cd3215cfba5b5fc02f94338ac16cc2cac
SHA512cacbe97b03cd2037fe28ae928b292a1558fc88ac2dc0a27e859efb413529e47f099b429e41202151f4f52fabf33c67911472edbf41132df1a7e6d1f0eac03b3f
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
4KB
MD5b98f45a83c1d09132e1e4ada1387a6f8
SHA19f0a343ec5060b269d36fe1045cff14185f15d1b
SHA25623661a4b1f3d6744fcdd1b2379e5e602e6cf6bd5950b2d19b844527b2f626e99
SHA512cb446acd93c4dd79e81b920075a7055140b27d3e83b43ad899736a0d37e709974b27c5340a4b864e3b41714523dd4daee07b506a2c40b36f9b9d05fdd5cc2612
-
Filesize
6KB
MD5505c7c214c17ac801f5930abc57d38c3
SHA1e9a17ed8182f92bf86babbd7ba8dd8770e8ff47e
SHA256999ebf5ef6bf51828193deaf7697e6d22419e437c65e603bffa0bb2acc7f40c8
SHA51230686f361db9d81c95912700af530529d4d89bf6b514a63ab5db6b20efc443b87aef44b598e45d33adee448ec1b6573ca035a1d20e11c78ea8253f1ecf5ebf38
-
Filesize
25KB
MD5bcf627d0db38c8e772e292b509a625de
SHA18ee208ff94930571b176ef92dba1c5ef5dd9c415
SHA2566bccf372e490c49a3850e4f326c6a988e08991bbfe6e89b9c35d3efe29d304c4
SHA512234c83b48e2f6e650a955cadcb227345f38392fc05101d21611c576307595a99e2e357be7ab6dc7d6d0a0deef501bc29dbca12907821cae9d9e2c8f17e21f7c1
-
Filesize
9KB
MD50d45588070cf728359055f776af16ec4
SHA1c4375ceb2883dee74632e81addbfa4e8b0c6d84a
SHA256067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a
SHA512751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415