Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 04:07

General

  • Target

    a9866d27ef92c3e0d66fb44765fb0c5b_JaffaCakes118.dll

  • Size

    703KB

  • MD5

    a9866d27ef92c3e0d66fb44765fb0c5b

  • SHA1

    06dc2103e5e9dd5c9453e4a4a09f334736772e46

  • SHA256

    da477cbd96f32b4e2c0f9ffdbaf7bf7f1bd8723a108210dcc7c1f2687ff16816

  • SHA512

    e9d1ac53ed0910306d43af32170da76dcb2c13336d364117618211d8e5d13f8c857e668a3414f20a2d7095a402b3fea3f0316970ff85396109737a78638d0cdd

  • SSDEEP

    12288:c6JEYj++RMqx2719DdAGPg7Nv9herg6jvaIucELQr/tQmjoIGA1/I/H/qU:c6JEu++2qxuiwQgtAcEEr/pJGsKHC

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a9866d27ef92c3e0d66fb44765fb0c5b_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a9866d27ef92c3e0d66fb44765fb0c5b_JaffaCakes118.dll
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5020-0-0x00000000021B0000-0x000000000232A000-memory.dmp

          Filesize

          1.5MB

        • memory/5020-1-0x00000000021B0000-0x000000000232A000-memory.dmp

          Filesize

          1.5MB

        • memory/5020-2-0x0000000002330000-0x00000000023CD000-memory.dmp

          Filesize

          628KB

        • memory/5020-3-0x0000000076F54000-0x0000000076F56000-memory.dmp

          Filesize

          8KB

        • memory/5020-4-0x00000000021B1000-0x00000000021C8000-memory.dmp

          Filesize

          92KB

        • memory/5020-10-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/5020-9-0x0000000003670000-0x0000000003671000-memory.dmp

          Filesize

          4KB

        • memory/5020-8-0x00000000036B0000-0x00000000036B1000-memory.dmp

          Filesize

          4KB

        • memory/5020-7-0x00000000036C0000-0x00000000036C1000-memory.dmp

          Filesize

          4KB

        • memory/5020-6-0x00000000036A0000-0x00000000036A1000-memory.dmp

          Filesize

          4KB

        • memory/5020-5-0x00000000021B0000-0x000000000232A000-memory.dmp

          Filesize

          1.5MB