Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
-
Size
11.4MB
-
MD5
d6caf3179dc94ffd1052f2a526390db6
-
SHA1
9c53c8bffcbbbe02fef88144d3fde1b8570695e1
-
SHA256
cfb6fb3812e6bfd9011254c6c40d030ff98cd80e72be1e98836d8da055525ea5
-
SHA512
d597e90035a9054cd0233bff5c18025e48fcad490b577c493f3a5d6bf8cc462511ae19417c2637851ba4e0435beb0cec028c2d5ba99676e99392c1d3c77e2b82
-
SSDEEP
196608:UTwx42RPPBdebEm1iWWHc1SUX6apg3ZhncrJPm59vzgO8L1vsqFRUo7t/IbsCTM9:UaRPiGWW8sUtu/Am5q91vsqFRn5AACTM
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 789B.tmp -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 789B.tmp Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 789B.tmp Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 789B.tmp -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 789B.tmp -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 789B.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 789B.tmp -
Executes dropped EXE 6 IoCs
pid Process 3576 7772.tmp 4360 789B.tmp 2016 7938.tmp 1016 789B.tmp 1816 789B.tmp 1468 7938.tmp -
Loads dropped DLL 1 IoCs
pid Process 4360 789B.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 789B.tmp -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 789B.tmp -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 789B.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\fonts\pns.ttf 789B.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7938.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7772.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 789B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7938.tmp -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\chst 7938.tmp Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\chst 7938.tmp Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\chst 7938.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1816 789B.tmp 1816 789B.tmp 1816 789B.tmp 1816 789B.tmp -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4360 789B.tmp Token: SeRestorePrivilege 4360 789B.tmp Token: SeDebugPrivilege 4360 789B.tmp Token: SeTakeOwnershipPrivilege 1816 789B.tmp Token: SeRestorePrivilege 1816 789B.tmp Token: SeDebugPrivilege 1816 789B.tmp -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp 4360 789B.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4360 789B.tmp 4360 789B.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3576 3956 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 86 PID 3956 wrote to memory of 3576 3956 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 86 PID 3956 wrote to memory of 3576 3956 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 86 PID 3576 wrote to memory of 4360 3576 7772.tmp 87 PID 3576 wrote to memory of 4360 3576 7772.tmp 87 PID 3576 wrote to memory of 4360 3576 7772.tmp 87 PID 3576 wrote to memory of 2016 3576 7772.tmp 88 PID 3576 wrote to memory of 2016 3576 7772.tmp 88 PID 3576 wrote to memory of 2016 3576 7772.tmp 88 PID 4360 wrote to memory of 1016 4360 789B.tmp 101 PID 4360 wrote to memory of 1016 4360 789B.tmp 101 PID 4360 wrote to memory of 1016 4360 789B.tmp 101 PID 4360 wrote to memory of 1816 4360 789B.tmp 102 PID 4360 wrote to memory of 1816 4360 789B.tmp 102 PID 4360 wrote to memory of 1816 4360 789B.tmp 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\7772.tmp"C:\Users\Admin\AppData\Local\Temp\7772.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp" /test4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp" /restart /util4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks system information in the registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\7938.tmp"C:\Users\Admin\AppData\Local\Temp\7938.tmp" "install"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Users\Admin\AppData\Local\Temp\7938.tmp"C:\Users\Admin\AppData\Local\Temp\7938.tmp" run1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD521f6343d000085f66de7d183f8183f60
SHA1927acfd39d2f9e80026cb14139f8a9cfab55b944
SHA256adc43a71c14753589f0a0eaa456d25ca297df785281a5e76cabc89999d7f8e25
SHA51259b3c94d9f73334f533f2e0656fd61f167872079ea64115b1934dbc673f588710176e7339d2916c2d9b7ce93d7e83d356a1c96c58f8f1b33df068a4e7842976b
-
Filesize
445B
MD5490848c76216309b898dfd8dcae3a6b9
SHA165ad0cd3df535b1570d6fb4fd101220628355186
SHA256a6483b680183bda7e03538e7a9d0c16867faa4af199d24d583cdb9a7a117c690
SHA512cc9f88342cd26a210fb993f8f6840cac73dd6b1de52e00a56f2ab71ae8a973831f2d1c8c5ca8bd91df96fe67796b13072cb2ab7fd8726dabb8754691000d64a1
-
Filesize
11.0MB
MD5bd670fcd41f77f519213dfad74496e87
SHA1ee77369da0985f2c7c863bece458b2ea60154cc8
SHA256a8c6b192ca4f2e208630d561ca88a9d5902afb050bcedbccecba0e3206eaef40
SHA512b1f055076120b51e9918c0cb2fca4943112685ec662d76a459680392dff5d3edfcc6a2576edf45ddd247b879ba5fe0b64c17ea556daa48928ef99058af85c683
-
Filesize
10.3MB
MD5d26a10f1d736b6f3e8950ac87e08b073
SHA152377ff734ab8ecfbc77ff3f953ac5d187dfb8fe
SHA25678b4db9798882b192bcf43f41655c8debdab5f295e7cd2429657c6022a1a7f98
SHA5121bc265b8f50dd332b58761b443faac71382d743bfdfc61e2bce1225714cb6364e40bffb2c92fa869df9e8e64efd3c52a78cc33d18011d1586d4f00bebdf3157e
-
Filesize
5.9MB
MD5d7ebb78bf1f0e4a8278b2d63013b1134
SHA1498b315dcba9bf4403d6748be61453d5d8991b61
SHA256c5a685088c44b1fbd01f49587af753b6a0f8f793de8d3b3d7e170574fef27ba8
SHA512ead20a19b5262ce34f13bae9c9d1082ce5bf740759ea82042d83600094e38de7aea87d7533fdd7660369ec5bb8549e107aff562fa477711515eb9c15c9c93312
-
Filesize
324KB
MD5bf9f6045d47dd87ae6d41fc7b5485506
SHA1462184bdd3c143f70ff7e9553966cb3d63b7cd12
SHA256f4cc03a26f2d13a41a86da8629b5d5c80a9ea586b6ba044e952b1972ab013440
SHA512bce57892b7cc2f44dae9eed0113530775f64e16d2846e6f08b10d76b9829e0885a94d816bf84d20ee5751ae3d3c536b6a9e6a75b4f95197d6317b032a839b605
-
Filesize
49KB
MD5abee4387ab69da821ed9397cc651597d
SHA15d14f4afdbe15448bf884b528ffffab874f920a7
SHA256ac1dfd38d2fa61e28211e196cd3d754f6ccfb220e8c1beba52e54825cf615e22
SHA512e014294cb60b66bd259f4a6ce262fc9eca30a30e7674dae178dbac6132ba464120e5d1076ee81c1210a2f42f819d94373733172cef9fda77c9effb4eed53a904
-
Filesize
5.0MB
MD59d23e2946b37a886dd9b5ce146cdd280
SHA1ac82352e5ef3988dd53403a9552bf9c4bc5162d3
SHA2569fabfffee8ef815f6e0f34c8909597ddf360ebff061151f18365202b774ceb20
SHA512872951f7ed72422e05e5957ab7bd274fdae2fba465b3177bba4b0dd1f1c7b047d7684977f7ad51fa79dd98b30b30dc6e52eac424798c31ae0e0fe31961b682a5
-
Filesize
1KB
MD508bf2c04b9edabe32534e12598b57815
SHA10a7fb1637e8e40793058bd62e82b6232fc931613
SHA256e5db9d6dbe6694f5ddafcb804749696c1b6b3e38ab20c034f1fe4539fb77cf65
SHA512535584e1eb91ae6fe553b2d4ba18cf355507938fb8c4e121109408d0bc18b30f9c58c9a19bb00f25ba1f93f48783809635f8cfb3222d6113d44f7244d46bf653
-
Filesize
127KB
MD5df8c626474a73ab7a8b511655597c7c4
SHA15de28f387ea88553d195d1978286d43c33231969
SHA256723091ba5a1b8e65164075516d69c00c71225c6dde61ffc32dd4047803ab42b5
SHA512c8f7d1577cb70610c40b96c835faca6b916c4924b5061351c8a67287567556b2014efb7c73cdcc4fb6533829541cd0264b8a9e428d3c572e29c06b0d96633d59