Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
e91cc94bcf70a4cd3a8f8c7df1bf88fa
-
SHA1
2ac449ecfca9d525b8b65da6c47a5525c0fe48b9
-
SHA256
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
-
SHA512
964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
-
SSDEEP
49152:GLftJlJ+XnNHogttWcDRzOEtZuFno0ezgLMF1MSR4aK7:ItihoEtWsgSY5vHMES6aK7
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/388-2-0x000000003F1A1000-0x000000003F1A6000-memory.dmp buer behavioral2/memory/388-3-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-4-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-5-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-6-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-7-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-8-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-9-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-10-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-11-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/388-17-0x000000003F1A0000-0x000000003F620000-memory.dmp buer behavioral2/memory/2164-18-0x000000003F4D1000-0x000000003F4D6000-memory.dmp buer behavioral2/memory/2164-20-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-21-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-22-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-23-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-24-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-25-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-26-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-31-0x000000003F4D0000-0x000000003F950000-memory.dmp buer behavioral2/memory/2164-32-0x000000003F4D0000-0x000000003F950000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2164 errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 2164 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 2164 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5096 1548 WerFault.exe 92 1480 1548 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language errorResponder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secinit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 2164 errorResponder.exe 2164 errorResponder.exe 2164 errorResponder.exe 2164 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 388 wrote to memory of 2164 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 91 PID 388 wrote to memory of 2164 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 91 PID 388 wrote to memory of 2164 388 e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe 91 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92 PID 2164 wrote to memory of 1548 2164 errorResponder.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 2884⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 2964⤵
- Program crash
PID:1480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1548 -ip 15481⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1548 -ip 15481⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1