Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe
-
Size
15.0MB
-
MD5
ef37c46e47a7de81e846d81df54cd33d
-
SHA1
98247e718da31648ae111f00ad51d6f78a95b164
-
SHA256
f809f81d95df1aba4838ef3f8bffb4c937901ee38d1404070a2dc7b3f02fda8f
-
SHA512
1674f76f0961b0b25b326f92f7fe5171540b999fc93a7a5a64a4a2ae38653fe7820a2d26f8dfe1468863d69e0e4527a9d493e2138fa6acafa2a6fdf40cefc346
-
SSDEEP
393216:4T4reXCcECLVPQfceGnpXP7vXxB3gIL9KgYPwIjEr83:hncEUxyc/7PxB3z/u
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2788 timeout.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2732 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2732 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2732 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2732 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2844 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2844 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2844 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2844 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2652 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2652 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2652 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 32 PID 2852 wrote to memory of 2652 2852 ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe 32 PID 2652 wrote to memory of 2788 2652 cmd.exe 35 PID 2652 wrote to memory of 2788 2652 cmd.exe 35 PID 2652 wrote to memory of 2788 2652 cmd.exe 35 PID 2652 wrote to memory of 2788 2652 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe"2⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C echo A debugger has been found running in your system.Please, unload it from memory and restart your program. && pause2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C TIMEOUT 2 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ef37c46e47a7de81e846d81df54cd33d_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\timeout.exeTIMEOUT 23⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2788
-
-