Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 22:19
Behavioral task
behavioral1
Sample
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
94f6bcd1c6b35a1c5d55dd2dbe7211da
-
SHA1
4d6359c3e61f8d54863d183d38ddc548c2a8702b
-
SHA256
9237e5cae5f698d5ad9f6c61af8bd866e599abb05f5bc49474d98e269a29a588
-
SHA512
832cfab9ee1f813f2a9a2fa3afae32646a00c10c71930cd034efa2c07d588facb9d782deba930376a499f2e76f1177a4d3a39bd2ca8bbdc37586e092c72ef8b0
-
SSDEEP
24576:Mm4KIe7WgCBxOQyvlHxhXjqpdwWow1Rht956wCLVAWRCySnAZWX:14GQ9yvlHCdwSZT56wCL1bSn3
Malware Config
Extracted
qakbot
-
salt
��G�6�P�<�����U]����c)���z
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
regsvr32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Processes:
resource yara_rule behavioral2/memory/4312-0-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-1-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-3-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-6-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-8-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-10-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-13-0x0000000010000000-0x0000000010429000-memory.dmp themida behavioral2/memory/4312-18-0x0000000010000000-0x0000000010429000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
regsvr32.exepid process 4312 regsvr32.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2320 4012 WerFault.exe explorer.exe 2448 3760 WerFault.exe explorer.exe 5008 3680 WerFault.exe mobsync.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exeexplorer.exeexplorer.exemobsync.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mobsync.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exepid process 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
regsvr32.exepid process 4312 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2800 wrote to memory of 4312 2800 regsvr32.exe regsvr32.exe PID 2800 wrote to memory of 4312 2800 regsvr32.exe regsvr32.exe PID 2800 wrote to memory of 4312 2800 regsvr32.exe regsvr32.exe PID 4312 wrote to memory of 4012 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 4012 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 4012 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 4012 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 4012 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3760 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3760 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3760 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3760 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3760 4312 regsvr32.exe explorer.exe PID 4312 wrote to memory of 3680 4312 regsvr32.exe mobsync.exe PID 4312 wrote to memory of 3680 4312 regsvr32.exe mobsync.exe PID 4312 wrote to memory of 3680 4312 regsvr32.exe mobsync.exe PID 4312 wrote to memory of 3680 4312 regsvr32.exe mobsync.exe PID 4312 wrote to memory of 3680 4312 regsvr32.exe mobsync.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7324⤵
- Program crash
PID:2320
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 7324⤵
- Program crash
PID:2448
-
-
-
C:\Windows\SysWOW64\mobsync.exeC:\Windows\SysWOW64\mobsync.exe3⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 4004⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3760 -ip 37601⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3680 -ip 36801⤵PID:3496