Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
ab5df308f5586d30f3ca287b139b861a
-
SHA1
014deda1700f66168ff02e005dbf33538988fe9c
-
SHA256
6d1591244286faf5ea19303b91a6ac7807bc648e68216beac41a3514b09a5dc1
-
SHA512
8b1759a4ccfc2f23aa09ff21f8300b8e8009aa88bc88fe88a3a5a44a750a058ba490d1985284bbcf94b8d2f7e83dce87b671ed0bf1949b826af9044f98368f23
-
SSDEEP
24576:gl9cAfnteSDfvdWsGDa60fM+psJcwTMav9x:gDbfPtWEPM+pHav9x
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Wine ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
Unexpected DNS network traffic destination 12 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.158.16.48 Destination IP 12.20.127.211 Destination IP 165.243.5.15 Destination IP 216.136.33.82 Destination IP 12.107.200.146 Destination IP 168.215.165.186 Destination IP 128.107.241.182 Destination IP 67.227.137.54 Destination IP 162.27.34.248 Destination IP 63.99.29.69 Destination IP 209.5.7.216 Destination IP 204.50.159.105 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe 4376 ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab5df308f5586d30f3ca287b139b861a_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4376