Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
d5d27e590e5e167859c6d8fdde8a9519_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d5d27e590e5e167859c6d8fdde8a9519_JaffaCakes118.dll
-
Size
767KB
-
MD5
d5d27e590e5e167859c6d8fdde8a9519
-
SHA1
a2689e51d7d68e2f5f941f615ec67ed8e35742ac
-
SHA256
3505dddb588b32470f61feb5bd15352c843a65d787f2ab4a52589b70da03e405
-
SHA512
11de5c61ffe790645a40d85cc8619739872bd971343b96e6099804f5ad0a80d7238e0103eebeb107ac0ebfbe0ace3ff75c9e04998bdb930773067e34ed32b2cb
-
SSDEEP
12288:N62XlzDBPF+QzMfkptiWscrb3YCuP04yCWtegnZsDHgaju1f4x/O6mmNpAVmjZoz:N6KVDBPsQx5pb3EP04yNeUZsDHgaK1lm
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Wine regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2436 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 regsvr32.exe 2436 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2436 3944 regsvr32.exe 84 PID 3944 wrote to memory of 2436 3944 regsvr32.exe 84 PID 3944 wrote to memory of 2436 3944 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d5d27e590e5e167859c6d8fdde8a9519_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d5d27e590e5e167859c6d8fdde8a9519_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436
-