Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe
-
Size
270KB
-
MD5
545930f8c486cdc187f8b5f27de5e40f
-
SHA1
f7fa254a5e8c769e97c702b9f0bf3010b387a149
-
SHA256
ef68ed44eb8c2b8f551ce85d759f26aa5a5b01bbffc24664d95ed3ba8ae361b4
-
SHA512
8db83f7151838f8665b1421f74788ca21e8bab8ffd5e159f5c066cd973cea2e2f8d75d43f2b9a73ebadf4d4742703dba06aed30c1841cc30c7edd5945d63ee11
-
SSDEEP
6144:ye/d6MQSsEkshGE+seGCsAjtsmDoTcejx8V5cTaILj8Twd:LH1sfs5+fG/AjtsmEL+mTa9wd
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2732 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2732 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2732 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe 31 PID 2408 wrote to memory of 2732 2408 545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins2158.bat "C:\Users\Admin\AppData\Local\Temp\545930f8c486cdc187f8b5f27de5e40f_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42