Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 14:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe
-
Size
72KB
-
MD5
5c5b189834d3aee383a8e86cfc528818
-
SHA1
b1104394bf85a6750128003c86eb9c98dc7a9876
-
SHA256
cf616703ffa23bd04f29e181c9ad89205a165a2b0301f189423ab25e0ca6358b
-
SHA512
7ab07f0d5e26b133b6b1d4e75cae471e5a9858abf171ba7ddf61de2b64c4973c7a0864665f0449112645075bd0a152f34b368cd175b71d75ee2b24986174a60d
-
SSDEEP
768:YMNY8AA65VFH+QF5BrUxOAjpfT+irbhbxTqwFgHgMTFMr:YMg5VFHRF5Br+jpNLqHH12r
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe:*:Enabled:ldrsoft" 5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3564-2-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3564-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3564-6-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 5112 3564 WerFault.exe 83 4924 3564 WerFault.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c5b189834d3aee383a8e86cfc528818_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Checks BIOS information in registry
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 10762⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 10682⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3564 -ip 35641⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3564 -ip 35641⤵PID:3020