Analysis
-
max time kernel
1s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe
-
Size
582KB
-
MD5
ac47a1c79a27e4493f452870cff3b45f
-
SHA1
55d303fb1d21ce3a9b0eeeab5c4c840b77fd3513
-
SHA256
d0d1ff0a048a2179399574aff2ca95d612676177c27f469296dacc95d2287f45
-
SHA512
e5810bad5c11f844a129f3aa7cb5dfb4e0dd08ec0708582e26fab5375b0e93262c806ef29fc1477c56f6444f7ae2476b125f8611caad3bbd19ec00ede1639353
-
SSDEEP
12288:EODa7BlXNDRghT9yTvu9RrxsAXNYMJJRqahfOz:Du3XtRSyTvu9IA9VJzT8
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sot.exe -
Executes dropped EXE 3 IoCs
pid Process 2344 qxFSVWOcegcPUPu1.exe 1732 rot.exe 1748 sot.exe -
Loads dropped DLL 6 IoCs
pid Process 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1748-31-0x0000000000330000-0x00000000003C2000-memory.dmp upx behavioral1/memory/1748-30-0x0000000000330000-0x00000000003C2000-memory.dmp upx behavioral1/memory/1748-27-0x0000000000330000-0x00000000003C2000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sot.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 rot.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxFSVWOcegcPUPu1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sot.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1748 sot.exe 1748 sot.exe 2344 qxFSVWOcegcPUPu1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1748 sot.exe Token: SeShutdownPrivilege 1732 rot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 qxFSVWOcegcPUPu1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2344 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2344 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2344 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2344 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1732 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1732 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1732 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1732 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1748 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 32 PID 2140 wrote to memory of 1748 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 32 PID 2140 wrote to memory of 1748 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 32 PID 2140 wrote to memory of 1748 2140 ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac47a1c79a27e4493f452870cff3b45f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\qxFSVWOcegcPUPu1.exeqxFSVWOcegcPUPu1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
C:\Users\Admin\rot.exerot.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Users\Admin\sot.exesot.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5abb3650e99144a737aab6829d228c7cd
SHA15bba0901dd158ebc700419c9b8aa135561e44b06
SHA256a21362c6e6f020162c5122dbf3155856c19322530fc409e19033710c75806623
SHA5125285a8a7ecf05781af95ab8793b81e91a1a0195b1fb5ec6aa39d2cd25119acedc89e787638c7ece799e286cede12bc1e7c30827f315fc76a009a04778596b89f
-
Filesize
228KB
MD58258e740c3a26617a8f4ca416f80dfdf
SHA1a6f00e7fd39da24516d87ff62b5698e7b3647698
SHA256084a552233390bc5e4aed9dd669e8732c09569db88d73709132298d926182f8c
SHA5127dcd7dcf1d4253d11b3b9bc5a43486e6322716fdd31e76791a88f7aab41cde01d408db0a0b2dc1041f7458e91b6da4ace48baa411324aa716aee48f4395d7438
-
Filesize
253KB
MD53479c7b86a5a0b15e31449522cc224ad
SHA19d43e946d536bab55aa572daab2c0e1b5f3dfe56
SHA256cc4871ecab10b369820db88615b1e0de659afd9a5330f311af29b19965930bd4
SHA512f2e520a22d731406a3de7b2dc8bb23d8e95428a6ba242d4853d0e62f4e0531d1eafa43b6ff971c44f14720a1177e0e68d010205bb2551e80e54bbcee09352e42