Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2025, 23:09 UTC

General

  • Target

    JaffaCakes118_00c180e1763728f7114a83881921c364.exe

  • Size

    8.3MB

  • MD5

    00c180e1763728f7114a83881921c364

  • SHA1

    24e9c45eb2d38776a0d6ce8b6d63c7d6bd238c27

  • SHA256

    ef3a99af23b9f0078f49ebc2b2374f2a000d5500716953de0d3943ccd6ed2cbb

  • SHA512

    f699c3344da38f68e5b72f27ed0d7d7c5353a6109a049d7fa7ee680337515a20e4d969ef83f3369ef544f72149da0e5c19b3ba1e6f79fabefdb3c330850cd677

  • SSDEEP

    196608:02IGbIFIvCgcO9R3HQ7343j8TQ3e50jZ7WIwd58zOoGbj:02nhqOTg7o3uQO+jUIwj8zOoEj

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c180e1763728f7114a83881921c364.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00c180e1763728f7114a83881921c364.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • System Location Discovery: System Language Discovery
    PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2920-0-0x0000000000400000-0x000000000181A000-memory.dmp

    Filesize

    20.1MB

  • memory/2920-1-0x0000000000400000-0x000000000181A000-memory.dmp

    Filesize

    20.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.