Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
e91cc94bcf70a4cd3a8f8c7df1bf88fa
-
SHA1
2ac449ecfca9d525b8b65da6c47a5525c0fe48b9
-
SHA256
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
-
SHA512
964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
-
SSDEEP
49152:GLftJlJ+XnNHogttWcDRzOEtZuFno0ezgLMF1MSR4aK7:ItihoEtWsgSY5vHMES6aK7
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/2156-2-0x000000003F251000-0x000000003F256000-memory.dmp buer behavioral1/memory/2156-3-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-4-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-5-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-6-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-7-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-8-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-9-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-10-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-11-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2156-13-0x000000003F250000-0x000000003F6D0000-memory.dmp buer behavioral1/memory/2680-21-0x000000003F441000-0x000000003F446000-memory.dmp buer behavioral1/memory/2680-22-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-23-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-24-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-25-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-26-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-27-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-28-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-30-0x000000003F440000-0x000000003F8C0000-memory.dmp buer behavioral1/memory/2680-31-0x000000003F440000-0x000000003F8C0000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 2680 errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 2680 errorResponder.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 2680 errorResponder.exe 2680 errorResponder.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2680 2156 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 31 PID 2680 wrote to memory of 3036 2680 errorResponder.exe 32 PID 2680 wrote to memory of 3036 2680 errorResponder.exe 32 PID 2680 wrote to memory of 3036 2680 errorResponder.exe 32 PID 2680 wrote to memory of 3036 2680 errorResponder.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1