Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe
-
Size
113KB
-
MD5
6a06edf7220feef981bdf792639423cf
-
SHA1
f5264fbec2a6d25985cfd45791cc6782d60a80f2
-
SHA256
41db276d5cbc34f14c9e6e3e62f6d5c29a729ebddabdef81a4560d81621027c8
-
SHA512
ccba736de8953e270a428dfddb6d8ac1ea61d625047567ec932c47f96876cb7fc0ec72d1407263a6b4d1a94d1e931d341994ebac4eeb1b19a27eaa89aaea9838
-
SSDEEP
3072:hbVemShTk0mhkk8X7ANVu7HNUIXbM44UusJ4MLklJ:mzhRNFgDE8
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/5004-15-0x0000000000DF0000-0x0000000000DF5000-memory.dmp family_andromeda behavioral2/memory/5004-19-0x0000000000DF0000-0x0000000000DF5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\52410 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mszaww.exe" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mszaww.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 vbc.exe 3824 vbc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3824 vbc.exe 3824 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 2360 wrote to memory of 3824 2360 JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe 99 PID 3824 wrote to memory of 5004 3824 vbc.exe 100 PID 3824 wrote to memory of 5004 3824 vbc.exe 100 PID 3824 wrote to memory of 5004 3824 vbc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a06edf7220feef981bdf792639423cf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5004
-
-