Analysis
-
max time kernel
93s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe
-
Size
7KB
-
MD5
f09984effe9f171b3c38df49d24d2890
-
SHA1
8966cd34062bb21b26fd372f0f4a175825e8c4da
-
SHA256
b9ff07d7f00388f8bdd52ff242e5a89dd6f42391c9bfa06880606befa8e0eda6
-
SHA512
0ebf393ecd51b923d69764c2561b4156629389535e8c11d2900b14075f40503b4f49dfed03781a9fd33fabff23d2952c85b4ac8825a66088b0045b2c663220f8
-
SSDEEP
96:6SmG6kHWjs8FE2tMWsWrvF5cE2TYlnlYJnLeL0Kff345CQv1r5RXmm6CBajF:6Fjs8J6WFwV2nlYJLeLTg4on6CS
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2372 dw20.exe Token: SeBackupPrivilege 2372 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2372 4788 f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe 83 PID 4788 wrote to memory of 2372 4788 f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f09984effe9f171b3c38df49d24d2890_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7962⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2372
-