Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 22:19
Behavioral task
behavioral1
Sample
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
94f6bcd1c6b35a1c5d55dd2dbe7211da
-
SHA1
4d6359c3e61f8d54863d183d38ddc548c2a8702b
-
SHA256
9237e5cae5f698d5ad9f6c61af8bd866e599abb05f5bc49474d98e269a29a588
-
SHA512
832cfab9ee1f813f2a9a2fa3afae32646a00c10c71930cd034efa2c07d588facb9d782deba930376a499f2e76f1177a4d3a39bd2ca8bbdc37586e092c72ef8b0
-
SSDEEP
24576:Mm4KIe7WgCBxOQyvlHxhXjqpdwWow1Rht956wCLVAWRCySnAZWX:14GQ9yvlHCdwSZT56wCL1bSn3
Malware Config
Extracted
qakbot
-
salt
��G�6�P�<�����U]����c)���z
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
resource yara_rule behavioral2/memory/4312-0-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-1-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-3-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-6-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-8-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-10-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-13-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-18-0x0000000010000000-0x0000000010429000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4312 regsvr32.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2320 4012 WerFault.exe 88 2448 3760 WerFault.exe 102 5008 3680 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mobsync.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4312 2800 regsvr32.exe 84 PID 2800 wrote to memory of 4312 2800 regsvr32.exe 84 PID 2800 wrote to memory of 4312 2800 regsvr32.exe 84 PID 4312 wrote to memory of 4012 4312 regsvr32.exe 88 PID 4312 wrote to memory of 4012 4312 regsvr32.exe 88 PID 4312 wrote to memory of 4012 4312 regsvr32.exe 88 PID 4312 wrote to memory of 4012 4312 regsvr32.exe 88 PID 4312 wrote to memory of 4012 4312 regsvr32.exe 88 PID 4312 wrote to memory of 3760 4312 regsvr32.exe 102 PID 4312 wrote to memory of 3760 4312 regsvr32.exe 102 PID 4312 wrote to memory of 3760 4312 regsvr32.exe 102 PID 4312 wrote to memory of 3760 4312 regsvr32.exe 102 PID 4312 wrote to memory of 3760 4312 regsvr32.exe 102 PID 4312 wrote to memory of 3680 4312 regsvr32.exe 114 PID 4312 wrote to memory of 3680 4312 regsvr32.exe 114 PID 4312 wrote to memory of 3680 4312 regsvr32.exe 114 PID 4312 wrote to memory of 3680 4312 regsvr32.exe 114 PID 4312 wrote to memory of 3680 4312 regsvr32.exe 114
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7324⤵
- Program crash
PID:2320
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 7324⤵
- Program crash
PID:2448
-
-
-
C:\Windows\SysWOW64\mobsync.exeC:\Windows\SysWOW64\mobsync.exe3⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 4004⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3760 -ip 37601⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3680 -ip 36801⤵PID:3496