Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
-
Size
130KB
-
MD5
d242eac273bd1a414f92f5729b29bc06
-
SHA1
a095c2883460eb32bb75bc7b3a26997c2cae1ee4
-
SHA256
f13053e2cc8ce442539c9add379de1a3d4eab01e70c3cf7224c0181e6f4e9472
-
SHA512
12a6216cb40abdf4f0eec55b6ec7a2b257d5e13eb5e99e6bca0a8f2c4bcb7c7e33172415d9b64fecd11647d323bf0182e405288c4690f3e28141154c0cfaf1da
-
SSDEEP
3072:pmO9nEJjKxZCFS/mJ9zKm02nuksJ7uYWUeA9PdoO:3JEUrtk9zT1nuk9YWUddo
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Deletes itself 1 IoCs
pid Process 2504 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 1716 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1716 2108 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2504 1716 svchost.exe 31 PID 1716 wrote to memory of 2504 1716 svchost.exe 31 PID 1716 wrote to memory of 2504 1716 svchost.exe 31 PID 1716 wrote to memory of 2504 1716 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe")3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2504
-
-