Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe
-
Size
91KB
-
MD5
82eb93f4f3e8250cd307f55418f8a9b6
-
SHA1
eb8b11f863eaa2a40b14ece6f88a2644b7490291
-
SHA256
2f1519d567095f6995dbfb26a69e1dfffae2d9b17ef8ad1f96a22ce1d90764ff
-
SHA512
1e41c41265f12e599496eed5215cb2424cb11b8c34bf32a6bba637ea8d37f4b3fb90e0edc0a01a081010393b093736d9eb3a6abaa3c090e6b1c43a496d0b5248
-
SSDEEP
1536:gP43Ktdr6DpSAbcDL7HU4bFXQb2T2J9999939999ZRYeX5rG7M1999999999999s:gP43Ktdr0SAbcDLDU4bFXTiJ9999939m
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral1/memory/2972-17-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda behavioral1/memory/2972-21-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\45497 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mswqip.cmd" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Java\\Java.exe" JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mswqip.cmd svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\vbc.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2968 vbc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2968 vbc.exe 2968 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2304 wrote to memory of 2968 2304 JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe 29 PID 2968 wrote to memory of 2972 2968 vbc.exe 30 PID 2968 wrote to memory of 2972 2968 vbc.exe 30 PID 2968 wrote to memory of 2972 2968 vbc.exe 30 PID 2968 wrote to memory of 2972 2968 vbc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82eb93f4f3e8250cd307f55418f8a9b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2972
-
-