Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe
-
Size
560KB
-
MD5
8a389cca67c7fed10cbbda4a00a49212
-
SHA1
e54747de575d3dcc40d9cdfb396632274ccfa8ce
-
SHA256
a25a2bd8db68f1798ddfc7d85f69d68b6149a8aa968133efd1e1c611598c8de5
-
SHA512
b380f6f3683d1af760e309c7e15835652fe90e64d56c417de827376fdbeff49db288ac96f28c9372f0697eb806a565f6f33611bcc5925e6569835316150299bb
-
SSDEEP
12288:vIf5o4Ypuq5vhEOf3LNHhv3NW5M8KEeyE9QdZkPwC3:QiTwgTbNBvQ5MhEpE9Zb
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\PCGWIN32.LI4 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{28AFB06E-2E5D6EAB-5C449958-F8582B78} 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{28AFB06E-2E5D6EAB-5C449958-F8582B78}\ = 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 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{28AFB06E-2E5D6EAB-5C449958-F8582B78}\ = 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 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C} 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C}\ = "1615045937" 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{28AFB06E-2E5D6EAB-5C449958-F8582B78}\ = 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 8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a389cca67c7fed10cbbda4a00a49212_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
PID:4104