Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe
-
Size
720KB
-
MD5
67d47c2496ee8024823411c0a21bc2e7
-
SHA1
8aca9072586d652430cf936e4c0477980e66743d
-
SHA256
d2fb0c81731093b4c9deeb33ce4e264ee5989775f10448b13ce852b3e106fb72
-
SHA512
805c39b37b7246d6eff7a231e2c16d269f73c8bf6f7baf4e4cac52e69ef885febee8b1dcafe4fc116abd9a11566e2f56ebff784e677cf271e9ac2edc89d2dba8
-
SSDEEP
12288:ZJYu0cCcKtLszw0EVga2WMuCE97NNvH7jDgt5plQsW3fvml6LA0mb:ickLJ79JdH7wLV3z
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\InprocServer32 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\InprocServer32\ = "C:\\Windows\\SysWOW64\\avifil32.dll" 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\InprocServer32\ThreadingModel = "Both" 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547} 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\ = "Microsoft Wave File" 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\AVIFile 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D467FEAE-5CF6-50F0-1AD6-C3B26C251547}\AVIFile\ = "7" 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 4920 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4920 5096 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 84 PID 5096 wrote to memory of 4920 5096 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 84 PID 5096 wrote to memory of 4920 5096 67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67d47c2496ee8024823411c0a21bc2e7_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4920
-