Analysis
-
max time kernel
143s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
b38b434a32ef25b5c5cde70bef6a3be5
-
SHA1
bf15f1585e8676fbfd3acd972ab522a8630311dc
-
SHA256
3eeac00ea7f4165bcc97bfd2423980861587672def9679029b803e252aa65c4d
-
SHA512
a6d9230b5de597034f6aac96dc1d0d2f9bbd03c7849306a2077e959528f8bd91df9703ce9156944fec38f4abf778676df694f60484a1db978027578b14146b1f
-
SSDEEP
49152:dpToKhpUcKpn8xO9d021MYqD9BP/n3NHj:UKjUcKJBK21MZDXP/n9D
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kb0.136.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate kb0.136.exe -
Executes dropped EXE 3 IoCs
pid Process 2904 kb0.136.exe 2804 BT Engine v5.07.exe 2648 is-5JRAS.tmp -
Loads dropped DLL 12 IoCs
pid Process 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 2804 BT Engine v5.07.exe 2804 BT Engine v5.07.exe 2804 BT Engine v5.07.exe 2804 BT Engine v5.07.exe 2768 WerFault.exe 2768 WerFault.exe 2648 is-5JRAS.tmp 2648 is-5JRAS.tmp 2768 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2904 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kb0.136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BT Engine v5.07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-5JRAS.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 is-5JRAS.tmp -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2904 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2804 2520 b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe 31 PID 2904 wrote to memory of 2768 2904 kb0.136.exe 33 PID 2904 wrote to memory of 2768 2904 kb0.136.exe 33 PID 2904 wrote to memory of 2768 2904 kb0.136.exe 33 PID 2904 wrote to memory of 2768 2904 kb0.136.exe 33 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34 PID 2804 wrote to memory of 2648 2804 BT Engine v5.07.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b38b434a32ef25b5c5cde70bef6a3be5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\kb0.136.exe"C:\Users\Admin\AppData\Local\Temp\kb0.136.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5563⤵
- Loads dropped DLL
- Program crash
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe"C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\is-8H8J1.tmp\is-5JRAS.tmp"C:\Users\Admin\AppData\Local\Temp\is-8H8J1.tmp\is-5JRAS.tmp" /SL4 $60150 "C:\Users\Admin\AppData\Local\Temp\BT Engine v5.07.exe" 723322 506883⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
913KB
MD5e09153f89a7fee92f24192d58a453254
SHA1723406bb4841cb02794c611515664fd9abfe3f3b
SHA256fcdbe26ad10ff3ee32984c16f3b72cfcf32fae4c028e66dd9450c403138a25a1
SHA5125ce34fc091455881f5d693769c1ee9430d3a49659fc03491dd46adac3a803d963e0dee0c71743240c4429b5d189adeff29c56516f67b4874e005cecf95c26b18
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
572KB
MD50d0622f7d2fd629455a028d7e1cb1c07
SHA182bdfc15f188241c535d7a42f0f95c99d0913bf4
SHA256ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a
SHA512eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a
-
Filesize
912KB
MD594beee2d6abd0cbb1667fa634fd39662
SHA12a108abe8675e52ae76a5dbc6f8596784472e62a
SHA256a00384a1b1b311f280f9c2f4f7b9b81a1ada1596956e753c3f148fe29cc645e2
SHA512e6eb3183badd8d596282ba902e012069cca36318b87dd92fb0dfe569f1c28f7e55c3ff724d938edd38b867ff2041e9cb248df9e1242d45a85c382e0115ad11bc