Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 20:03
Behavioral task
behavioral1
Sample
fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
fad4f0b5fd22d5528d4d5d5fde5d063f
-
SHA1
ff8e7d9870116a4becec6048c6ed49ed3cf2b548
-
SHA256
c9c6efea447e49ca0d239f78d424863bb1d915183721666bfd98945bdde34cdc
-
SHA512
3e66976a174b2342115ed8453063a475b0c9d3ebe45b10c85ef2f4a06ad015a1b974a3ec4c8a2f7ae72959593e93a82048e098c89ae4197dfa5e98bdda60e90e
-
SSDEEP
49152:qMTepmkCWpiob7y29wbT8+wBTxn/Ihz94Pp:TgXQPIT0RY
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1476-5-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-57-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-59-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-63-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-67-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-74-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-78-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-81-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-85-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-88-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-99-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-102-0x0000000000400000-0x00000000007D4000-memory.dmp upx behavioral1/memory/1476-106-0x0000000000400000-0x00000000007D4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\1 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\1\ = "Embed_Source,1,8,1" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DefaultIcon fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DefaultIcon\ = "C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\misc.exe,10" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\MiscStatus\16\ = "1" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\ProgID fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\verb\1\ = "&Open,0,2" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\AuxUserType\3\ = "Microsoft Equation Editor 3.0" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\verb fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\Conversion\Readable\Main fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\Conversion\Readable fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\InProcHandler\ = "ole2.dll" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\LocalServer32 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\MiscStatus\16 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\verb\1 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\AuxUserType\2\ = "Equation" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\Conversion\Readable\Main\ = "Equation,Equation.2,1" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\2 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\3\ = "3,1,32,1" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\Insertable fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\MiscStatus fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\MiscStatus\ = "0" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\VersionIndependentProgID fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048} fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\VersionIndependentProgID\ = "Equations" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\AuxUserType\2 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\0\ = "Document,1,1,3" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\InprocHandler32 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\AuxUserType fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\3 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\ProgID\ = "Equation.3" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\verb\0\ = "&Edit,0,2" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\ = "Microsoft Equation 3.0" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\InprocHandler32\ = "ole32.dll" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\verb\0 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\0 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\Conversion fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\DataFormats\GetSet\2\ = "1,1,1,3" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\InProcHandler fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\LocalServer32\ = "C:\\PROGRA~2\\COMMON~1\\MICROS~1\\EQUATION\\EQNEDT32.EXE" fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\LocalServer32\LocalServer32 = 780062002700420056004e002900380041002400210021002100210021004d004b004b0053006b004500710075006100740069006f006e0045006400690074006f007200460069006c006500730049006e0074006c005f0031003000330033003e0042006f0054005d006a0049007b006a00660028003d00310026004c005b002d00380031002d005d0000000000 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C231048-7C23-1048-7C23-10487C231048}\AuxUserType\3 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1476 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1476 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1476 fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fad4f0b5fd22d5528d4d5d5fde5d063f_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD5fe9c08834ae580f4efbefe1eabb3bef3
SHA1cdafcc610b8a895e918b7d8071ce53442e5f9950
SHA2564cb4572bc1fb078b30da91f1d54cae9833a54b27f198369a291221e119779e95
SHA512ad41b5781cc1681c0f89db6a62d5a5d09e3d22c5eee224a0f3098c49483cbb2562f202df8e7c63779da780324bd585f2781515b91ed6829ce253fef14ecaf4ff