Analysis
-
max time kernel
20s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
80ab06a6735834afa0d144ac43811686
-
SHA1
4c2516bf85f6011b52ed85cf6f44f333a577cd5b
-
SHA256
59bed821cdd4c9d368d4ed4296af2e84425ad40c92c804ea18709790b7e4380a
-
SHA512
fb7050247366331a1d920fbd235374d923ff36c623b373ba3b6a561a58b6319dc83679f9cd82bf0cf601b0f2b48b8d2cc875025adc0917a000cae6a108ddf546
-
SSDEEP
49152:pmD4NSnnU5bnLtkfSP8KgkPiQT6JM34uc0C3SN4CZc:pgFnYe6kKgWiQT6Ji5CimF
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
Diamondfox family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe -
Deletes itself 1 IoCs
pid Process 1988 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2744 explorer.exe 948 explorer.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 2744 explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 108 set thread context of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 2744 set thread context of 948 2744 explorer.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Kills process with taskkill 1 IoCs
pid Process 2192 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 2744 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 2744 explorer.exe 948 explorer.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 108 wrote to memory of 2832 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 29 PID 108 wrote to memory of 2832 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 29 PID 108 wrote to memory of 2832 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 29 PID 108 wrote to memory of 2832 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 29 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 108 wrote to memory of 2964 108 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 31 PID 2964 wrote to memory of 2744 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 33 PID 2964 wrote to memory of 2744 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 33 PID 2964 wrote to memory of 2744 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 33 PID 2964 wrote to memory of 2744 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 33 PID 2744 wrote to memory of 3008 2744 explorer.exe 34 PID 2744 wrote to memory of 3008 2744 explorer.exe 34 PID 2744 wrote to memory of 3008 2744 explorer.exe 34 PID 2744 wrote to memory of 3008 2744 explorer.exe 34 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2744 wrote to memory of 948 2744 explorer.exe 36 PID 2964 wrote to memory of 1988 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 37 PID 2964 wrote to memory of 1988 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 37 PID 2964 wrote to memory of 1988 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 37 PID 2964 wrote to memory of 1988 2964 80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe 37 PID 948 wrote to memory of 2192 948 explorer.exe 39 PID 948 wrote to memory of 2192 948 explorer.exe 39 PID 948 wrote to memory of 2192 948 explorer.exe 39 PID 948 wrote to memory of 2192 948 explorer.exe 39 PID 948 wrote to memory of 2276 948 explorer.exe 41 PID 948 wrote to memory of 2276 948 explorer.exe 41 PID 948 wrote to memory of 2276 948 explorer.exe 41 PID 948 wrote to memory of 2276 948 explorer.exe 41 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED" /v EnableBalloonTips /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\80ab06a6735834afa0d144ac43811686_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exeC:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED" /v EnableBalloonTips /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe"C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe"4⤵
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:948 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM wscript.exe /F5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc ONLOGON /tn explorer.exe /tr "C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\F9C3BDD7.cmd3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5da65215971f7176aef3edead6723780c
SHA174405d09af117a83333fa45cf3739909521a8547
SHA2568cf23928811a9a29e14acc763283b0f6583692e3d1653bb3a665a666e268b72c
SHA512932e321ddd7869690689cae9405149d82b1448cf20eebdaa7b7c4b34a63169e4f6b401a0467ae283de35cad4a80f1ccb7ed7a87693dfdf7862d12a6f4eb50db6
-
Filesize
1.8MB
MD580ab06a6735834afa0d144ac43811686
SHA14c2516bf85f6011b52ed85cf6f44f333a577cd5b
SHA25659bed821cdd4c9d368d4ed4296af2e84425ad40c92c804ea18709790b7e4380a
SHA512fb7050247366331a1d920fbd235374d923ff36c623b373ba3b6a561a58b6319dc83679f9cd82bf0cf601b0f2b48b8d2cc875025adc0917a000cae6a108ddf546