Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
6664d47c91df78f64a4a22131096251f
-
SHA1
a5872faaefb33fbcfdd846480a2241b34fd3c1dd
-
SHA256
96dcff09eedc62c3cbdcdeaf663f54097a3fa90a8b5573fe8aeee6db148edd61
-
SHA512
4ba24b980065f9d588c8d838c906358ec0678d5aaee28b0da44c9b77203f65dca23ca73e9809175ddc65238a3ec12f0cbad57ae845b9b0ac364785f7f114bd84
-
SSDEEP
24576:xIj6LrTQlLga5oSsTrViGK7F38wzPXP84cOR19DdLPRlR02lFdWDze8:h65NsThK9prf8kRnDBRNVOe8
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1880 3348 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3348 4068 6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe 86 PID 4068 wrote to memory of 3348 4068 6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe 86 PID 4068 wrote to memory of 3348 4068 6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6664d47c91df78f64a4a22131096251f_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
PID:3348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3348 -s 10403⤵
- Program crash
PID:1880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3348 -ip 33481⤵PID:4844