Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
-
Size
113KB
-
MD5
6a06edf7220feef981bdf792639423cf
-
SHA1
f5264fbec2a6d25985cfd45791cc6782d60a80f2
-
SHA256
41db276d5cbc34f14c9e6e3e62f6d5c29a729ebddabdef81a4560d81621027c8
-
SHA512
ccba736de8953e270a428dfddb6d8ac1ea61d625047567ec932c47f96876cb7fc0ec72d1407263a6b4d1a94d1e931d341994ebac4eeb1b19a27eaa89aaea9838
-
SSDEEP
3072:hbVemShTk0mhkk8X7ANVu7HNUIXbM44UusJ4MLklJ:mzhRNFgDE8
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral1/memory/2496-19-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda behavioral1/memory/2496-23-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\12848 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msyyobcfq.pif" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msyyobcfq.pif svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\vbc.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1808 vbc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1808 vbc.exe 1808 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 2680 wrote to memory of 1808 2680 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 30 PID 1808 wrote to memory of 2496 1808 vbc.exe 31 PID 1808 wrote to memory of 2496 1808 vbc.exe 31 PID 1808 wrote to memory of 2496 1808 vbc.exe 31 PID 1808 wrote to memory of 2496 1808 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2496
-
-