Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 22:19
Behavioral task
behavioral1
Sample
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
94f6bcd1c6b35a1c5d55dd2dbe7211da
-
SHA1
4d6359c3e61f8d54863d183d38ddc548c2a8702b
-
SHA256
9237e5cae5f698d5ad9f6c61af8bd866e599abb05f5bc49474d98e269a29a588
-
SHA512
832cfab9ee1f813f2a9a2fa3afae32646a00c10c71930cd034efa2c07d588facb9d782deba930376a499f2e76f1177a4d3a39bd2ca8bbdc37586e092c72ef8b0
-
SSDEEP
24576:Mm4KIe7WgCBxOQyvlHxhXjqpdwWow1Rht956wCLVAWRCySnAZWX:14GQ9yvlHCdwSZT56wCL1bSn3
Malware Config
Extracted
qakbot
-
salt
��G�6�P�<�����U]����c)���z
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
resource yara_rule behavioral1/memory/1704-0-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/1704-2-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/1704-3-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/2576-5-0x00000000001C0000-0x00000000005E9000-memory.dmp themida behavioral1/memory/1704-6-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/1704-9-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/1320-14-0x0000000000250000-0x0000000000679000-memory.dmp themida behavioral1/memory/1704-13-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral1/memory/1704-22-0x0000000010000000-0x0000000010429000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1704 regsvr32.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2640 2576 WerFault.exe 31 2708 1320 WerFault.exe 2948 1724 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mobsync.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 regsvr32.exe 1704 regsvr32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1704 regsvr32.exe 1704 regsvr32.exe 1704 regsvr32.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 3032 wrote to memory of 1704 3032 regsvr32.exe 30 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 1704 wrote to memory of 2576 1704 regsvr32.exe 31 PID 2576 wrote to memory of 2640 2576 explorer.exe 32 PID 2576 wrote to memory of 2640 2576 explorer.exe 32 PID 2576 wrote to memory of 2640 2576 explorer.exe 32 PID 2576 wrote to memory of 2640 2576 explorer.exe 32 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1704 wrote to memory of 1320 1704 regsvr32.exe 33 PID 1320 wrote to memory of 2708 1320 explorer.exe 34 PID 1320 wrote to memory of 2708 1320 explorer.exe 34 PID 1320 wrote to memory of 2708 1320 explorer.exe 34 PID 1320 wrote to memory of 2708 1320 explorer.exe 34 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1704 wrote to memory of 1724 1704 regsvr32.exe 35 PID 1724 wrote to memory of 2948 1724 mobsync.exe 36 PID 1724 wrote to memory of 2948 1724 mobsync.exe 36 PID 1724 wrote to memory of 2948 1724 mobsync.exe 36 PID 1724 wrote to memory of 2948 1724 mobsync.exe 36
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 2244⤵
- Program crash
PID:2640
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 2244⤵
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\mobsync.exeC:\Windows\SysWOW64\mobsync.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1524⤵
- Program crash
PID:2948
-
-
-