Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 09:29
Behavioral task
behavioral1
Sample
e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
e9aeccb2d0b469a5f7fcd429291261fc
-
SHA1
e89c24f47c5f5fdea9cb9de2cf157c5572008f17
-
SHA256
e60dcf2bff28dbaaf4b0d2102d89c2c7bbc8c5703a4fe4fe718846b44f407c64
-
SHA512
ba42be08c9a5dbcffef2d0cbfd346797bc7d7059575758492d0f8b9affa8e0decfef30fd9f5bc0d686fbdcae03cf962fad4310304255f33c5a955f62fa42b618
-
SSDEEP
24576:fQKtu1W4hQGbKlL+M8+jU4jGCpxEYrsIGndT/0ACx2mPlCZLBx9e:fQN1WDGbKQTOU4RrrXGdrdmcZlP
Score
7/10
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1152-0-0x0000000000400000-0x0000000000649000-memory.dmp themida behavioral1/memory/1152-1-0x0000000000400000-0x0000000000649000-memory.dmp themida behavioral1/memory/1152-28-0x0000000000400000-0x0000000000649000-memory.dmp themida behavioral1/memory/1152-29-0x0000000000400000-0x0000000000649000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TmmmanH = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe" e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1152 e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Arquivos comuns\Flash Player\ e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Arquivos comuns\Flash Player\ArjcurX.exe e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Arquivos comuns\Flash Player\TmmmanH.exe e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe 1152 e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9aeccb2d0b469a5f7fcd429291261fc_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1152