Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 12:40

General

  • Target

    5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    5bfc13855e5b91da5262b4d39f3ada77

  • SHA1

    663559180f3985de680b9b53ea24cc1f17cb1682

  • SHA256

    84389c992ca3fb572fd379b522cc8182bd102eb93223c83dbe55d22b588bd8ba

  • SHA512

    e3cc2a1178e40c2b3e5479ca58e26a357840f0c1585d23564c8ed62f53cdded44d38bddc8b5651afc63d1cbc8aa7a922b6642e148b0945c7abca13af8c31ae26

  • SSDEEP

    24576:HZ3cYt/NGfXF67H0zNGdxPEkE+UpxpadGGSctbV0nGhWgpNSvnuGR:H1Lt/MvF6L0zN8EkrDtB0GhRLSWGR

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4860-0-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-1-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-2-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-4-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-5-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-3-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-6-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-7-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-8-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-9-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-10-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-11-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-12-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-13-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-14-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-15-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-16-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-17-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-18-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB

  • memory/4860-19-0x0000000000350000-0x00000000006D2000-memory.dmp

    Filesize

    3.5MB