Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
6eea66a6e9875547c9f9215428141902
-
SHA1
d5b36df76d684df1693c359061d1de086fbe64e0
-
SHA256
4b2ed73de06d0ca3fc62179593223adf95f7118c542d1c5a8761f0629ef0cad7
-
SHA512
fe406ab7568715f2d07d798bbf6158615a9a7b2de299f9a816f168dea0560dc67ff769fd7dc60f5f6354adbe544a85b97f63d389df33641d9b5cb1bc0f46cf69
-
SSDEEP
49152:4vyv0jQUJhNzP5QeQybVoXpRtbv9IjPkCh9/:4g0jQ754QtBIgS
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4564-7-0x000000003F130000-0x000000003F5BC000-memory.dmp buer behavioral2/memory/4884-13-0x000000003FF10000-0x000000004039C000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 4884 plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 4884 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 4884 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4040 3060 WerFault.exe 87 4356 4884 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plugin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 4884 plugin.exe 4884 plugin.exe 4884 plugin.exe 4884 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4884 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 84 PID 4564 wrote to memory of 4884 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 84 PID 4564 wrote to memory of 4884 4564 6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe 84 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87 PID 4884 wrote to memory of 3060 4884 plugin.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2244⤵
- Program crash
PID:4040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 8123⤵
- Program crash
PID:4356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3060 -ip 30601⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4884 -ip 48841⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56eea66a6e9875547c9f9215428141902
SHA1d5b36df76d684df1693c359061d1de086fbe64e0
SHA2564b2ed73de06d0ca3fc62179593223adf95f7118c542d1c5a8761f0629ef0cad7
SHA512fe406ab7568715f2d07d798bbf6158615a9a7b2de299f9a816f168dea0560dc67ff769fd7dc60f5f6354adbe544a85b97f63d389df33641d9b5cb1bc0f46cf69