Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 12:40
Behavioral task
behavioral1
Sample
5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe
Resource
win7-20240704-en
1 signatures
150 seconds
General
-
Target
5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
5bfc13855e5b91da5262b4d39f3ada77
-
SHA1
663559180f3985de680b9b53ea24cc1f17cb1682
-
SHA256
84389c992ca3fb572fd379b522cc8182bd102eb93223c83dbe55d22b588bd8ba
-
SHA512
e3cc2a1178e40c2b3e5479ca58e26a357840f0c1585d23564c8ed62f53cdded44d38bddc8b5651afc63d1cbc8aa7a922b6642e148b0945c7abca13af8c31ae26
-
SSDEEP
24576:HZ3cYt/NGfXF67H0zNGdxPEkE+UpxpadGGSctbV0nGhWgpNSvnuGR:H1Lt/MvF6L0zN8EkrDtB0GhRLSWGR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4860-0-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-1-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-2-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-4-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-5-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-3-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-6-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-7-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-8-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-9-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-10-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-11-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-12-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-13-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-14-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-15-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-16-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-17-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-18-0x0000000000350000-0x00000000006D2000-memory.dmp themida behavioral2/memory/4860-19-0x0000000000350000-0x00000000006D2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4860 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4860 5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5bfc13855e5b91da5262b4d39f3ada77_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4860