Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 22:55

General

  • Target

    4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe

  • Size

    872KB

  • MD5

    4bc38e7b269dd41239c37ed8f415a279

  • SHA1

    d1e71df4bf45a003663aa5c03a407f39cce95c17

  • SHA256

    b5ff285ccf8b44a0390ba48925ef0ca797e17b59521065ee0dcb3d54bd2249c3

  • SHA512

    936f73bbc2394b12d3d56148472a3f66991ddc5048e2771447c834b278de57d64ebde8c8f7782392bbfd1f7a2df5fdb732bb751f9b1c27f4fbf21a89c4590f69

  • SSDEEP

    24576:w1UJlYxgTGC540pM6fGdMUmlQ0l11T/Wh0HCmeI:J9EslHT+h0imj

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 51 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4bc38e7b269dd41239c37ed8f415a279_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\test.exe
      C:/Windows/test.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab18C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\NSISPromotionEx.dll

          Filesize

          1.8MB

          MD5

          f64d6c038403367a03396e3438fcdb37

          SHA1

          3382664d84d896182a9f70fdfcbba47925d3ef3a

          SHA256

          e9538796a9a9d05814c29166e546b56f5fa5213db8d9ec92b35f3f5abeec05a5

          SHA512

          e1950d27512b1e29fe9caf2361449cdad585cba1ec3fb31d6ed543f31b2d7abae94bb15f8b536ce1a3566d4e7f5ff17426f6d41687ccdfc09fe332bc71a57f9b

        • C:\Users\Admin\AppData\Local\Temp\Tar298.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\t00703a6.tmp

          Filesize

          1KB

          MD5

          3f84f802f9e0a29fc4a161a7d71e24bb

          SHA1

          5b184658ebc39497933d22a74ea67ea31308168d

          SHA256

          c2337dcab87e468e14454d745ea4370ab67bb456742c1a4f39c7f7e4c14a22f3

          SHA512

          3ae65143109358f831301816ce33acbd7b436cfcfbeb1b956a03b633861bf2be8fdab77a30d5d18b1d0aabbfac18c8ee0e1182beefd0001b4bb8aed93bdfc1e3

        • C:\Windows\test.exe

          Filesize

          30.9MB

          MD5

          29b47d2508ba1fc815aa504c2783d567

          SHA1

          f30c46c3cc53e6b30b3a538be142317ebf686414

          SHA256

          120888f547a36a3de7649f852a7df4f2022e2342a9d7f2c409ce579c2ea305b7

          SHA512

          e999e8999e4ad26553ce7020876c1c8b4b7c4e8ed5b97eae2bb76429a86b8efe9c985ccc8d7b15cf6a949071d24db3b5566dd26269a486873b99d64453aad734

        • \Users\Admin\AppData\Local\Temp\NSISTrigger.dll

          Filesize

          97KB

          MD5

          4a8178519a84a5aefd06c9c720360c69

          SHA1

          d3598a9dee27879889b7ba3f3abe218586f11917

          SHA256

          fdd180c2c1006d1538bae0e968d24ae70f7386f30b42e13e9cf45a48d1b0bbc0

          SHA512

          967579323f7286fd3fa4f3c7f259ed9fccb63a8aa6fd2647fb8e2725c4d968b2fe2746a517078866393143d85c352e29a160b04a594f1b950d8918fa530655c8

        • \Users\Admin\AppData\Local\Temp\NSISUtil.dll

          Filesize

          268KB

          MD5

          5ab783060397099771eda0284ef3d453

          SHA1

          09a8c6ec492c1e59ec6e837121ee50b5f45b882f

          SHA256

          eed69ac3a08e2e989dfc06f2b8e18153f3be94407dd8e7eeb69be6c067a67de3

          SHA512

          bc800c35f6067c2a470c041d2c44ec7363686b496e0c332bab8e62f030dc3502b3dd29156ef0228b2afa311aa8b5572ed95df1a1b62d4be3f9b01b581e038d5d

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\Dialer.dll

          Filesize

          3KB

          MD5

          cfe0ac822ed2c3598de87fe3931c92a0

          SHA1

          0c603bdf81abe835621f29acd5ab2a67e670e762

          SHA256

          df2f6d3c9de979dbde3aa3cf0633fc8cd3215cfba5b5fc02f94338ac16cc2cac

          SHA512

          cacbe97b03cd2037fe28ae928b292a1558fc88ac2dc0a27e859efb413529e47f099b429e41202151f4f52fabf33c67911472edbf41132df1a7e6d1f0eac03b3f

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\System.dll

          Filesize

          11KB

          MD5

          a4dd044bcd94e9b3370ccf095b31f896

          SHA1

          17c78201323ab2095bc53184aa8267c9187d5173

          SHA256

          2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

          SHA512

          87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          b98f45a83c1d09132e1e4ada1387a6f8

          SHA1

          9f0a343ec5060b269d36fe1045cff14185f15d1b

          SHA256

          23661a4b1f3d6744fcdd1b2379e5e602e6cf6bd5950b2d19b844527b2f626e99

          SHA512

          cb446acd93c4dd79e81b920075a7055140b27d3e83b43ad899736a0d37e709974b27c5340a4b864e3b41714523dd4daee07b506a2c40b36f9b9d05fdd5cc2612

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\advsplash.dll

          Filesize

          6KB

          MD5

          505c7c214c17ac801f5930abc57d38c3

          SHA1

          e9a17ed8182f92bf86babbd7ba8dd8770e8ff47e

          SHA256

          999ebf5ef6bf51828193deaf7697e6d22419e437c65e603bffa0bb2acc7f40c8

          SHA512

          30686f361db9d81c95912700af530529d4d89bf6b514a63ab5db6b20efc443b87aef44b598e45d33adee448ec1b6573ca035a1d20e11c78ea8253f1ecf5ebf38

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\inetc.dll

          Filesize

          25KB

          MD5

          bcf627d0db38c8e772e292b509a625de

          SHA1

          8ee208ff94930571b176ef92dba1c5ef5dd9c415

          SHA256

          6bccf372e490c49a3850e4f326c6a988e08991bbfe6e89b9c35d3efe29d304c4

          SHA512

          234c83b48e2f6e650a955cadcb227345f38392fc05101d21611c576307595a99e2e357be7ab6dc7d6d0a0deef501bc29dbca12907821cae9d9e2c8f17e21f7c1

        • \Users\Admin\AppData\Local\Temp\nsoE9E4.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          0d45588070cf728359055f776af16ec4

          SHA1

          c4375ceb2883dee74632e81addbfa4e8b0c6d84a

          SHA256

          067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

          SHA512

          751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

        • memory/1516-0-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/1516-16-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB