Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe
-
Size
136KB
-
MD5
06b5b4038ba01757619f9295433f449c
-
SHA1
7b4c99d503df0c0787d03da0c4d5a19b98593893
-
SHA256
bb739186a46319bdedcb8bbcec2a0bd04243619f64bb585e32dab36d1284ab08
-
SHA512
cccced8b0ca449cb363e14b16078cc6b095e1467cbf6443e0277dc362d9eb516c6a0dc638365de29a24e2b5f3ed7b7820c552a6bb026eaaebadd207f13e13085
-
SSDEEP
3072:YRru1hYabLCqWCqOswZ3/ck6Pl+GgJ+oSQ4E/:YZibWgse3MMfl/
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\uninsrest = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uninrest.exe" 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\URLSearchHooks 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497} = " " 06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06b5b4038ba01757619f9295433f449c_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3760