Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
095f7d0a84effb215a56a25dc80706f0_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
095f7d0a84effb215a56a25dc80706f0_JaffaCakes118.dll
-
Size
716KB
-
MD5
095f7d0a84effb215a56a25dc80706f0
-
SHA1
b4cb169a955f215581459ca88a65dedc2d32081c
-
SHA256
6ae3b99efe1c87e3f0b053a7faa04bde5b727f9c13bc9812a8cd5a208480e0a8
-
SHA512
23dc18fcaa1a9e6375648c608aefc634b2ea246b114c9f9c4cf33788af673d93a7ef97121370ab0282e51616cdc51bdeb7e9f99d10bff029daa995182e33e51c
-
SSDEEP
12288:PGSJcxBgDr1Sh+tPkUcNNZl2DuZ/8jPqBzDDKZ5+g7mkTm:PGSJ1DpY+OUcNNHuuiiBjcmkq
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1952 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1952 regsvr32.exe 1952 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 1952 4224 regsvr32.exe 89 PID 4224 wrote to memory of 1952 4224 regsvr32.exe 89 PID 4224 wrote to memory of 1952 4224 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\095f7d0a84effb215a56a25dc80706f0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\095f7d0a84effb215a56a25dc80706f0_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4028,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:81⤵PID:2908