Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe
-
Size
1008KB
-
MD5
5d4df4765acb7e4eef2f077e23d6e0de
-
SHA1
b621fd4687bcc4b0dfc71c5e22ac3b99666ec915
-
SHA256
e1c39c2eea26202239e9e6bffec42a97e3eecbb5e9feebc6492dfd8d7cbb348e
-
SHA512
b3e83052d443acd979cea5cb41b0ac79fa3bea4e13d096b5f853aa5fb71612383304a3a7659cfe44ce03a56d6201239ea44bd95d979cb56e662af3cac9357d31
-
SSDEEP
12288:TdXZQQtQ7BdGpcmijUDlrbOcELC2FeBD1oBs6xZv8TBl4dfXMNQs7JQx:5XZQt7BdGpcmi2UtYD1iUtlkMQs7JQ
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\InprocServer32\ThreadingModel = "Both" 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\Programmable 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\VersionIndependentProgID 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\ = "InkObject Class" 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\InprocServer32 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\InprocServer32\ = "C:\\Windows\\SysWOW64\\InkObjCore.dll" 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\ProgID 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\ProgID\ = "InkObjCore.msinkaut.InkObject.1" 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19}\VersionIndependentProgID\ = "InkObjCore.msinkaut.InkObject" 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6B9FA19-C6B9-FA19-C6B9-FA19C6B9FA19} 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 376 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 376 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe Token: SeDebugPrivilege 376 5d4df4765acb7e4eef2f077e23d6e0de_JaffaCakes118.exe