Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 19:36

General

  • Target

    002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe

  • Size

    677KB

  • MD5

    002b9f0fc0c36a5bdaa2e7e7d64152b7

  • SHA1

    a27e620de6ddf8e5f605d70fd5bb1f25ec1f1796

  • SHA256

    73fefb5c219588cd054e5fa57c969119f5d8df3a005dd1bf3c14140bd53cf4c3

  • SHA512

    4da2212f7a993ff0f2fd9f8379c9c0b64ee4b7311d31203fb5eb5c577ce255c2a3b17f7bb4339aba606c15140fad35e21ad70de8ab4dc9bfa5e888e7d2b635fd

  • SSDEEP

    12288:8OEH+2IUmt/bHbxE6V6lW7+tYQAcjWnlVdn7mWYxDl8AIp9ys+3n7aTrg4Sf:7lamt/fW6V6VY7cqnlP7LYxJ8AGQX2gT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3408
      • C:\Users\Admin\AppData\Local\Temp\002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1572
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          3⤵
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2876
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          3⤵
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2584
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4232,i,1305347165619645738,15927664461101562802,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:8
      1⤵
        PID:5116

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

        Filesize

        789KB

        MD5

        de87fd230a0a3d3da97ba2a6208f9641

        SHA1

        2a3cfdd72656431ba8c0f4b2acea8e5403a2bc82

        SHA256

        0553b24691916f02f22bafa973b9631c73817e7df5b274a311bc661cd534c8eb

        SHA512

        297a5d4d31d6f2c8999ee14ca474d238678ee02cccf12b7c1705a73022e45f23122f553a2d3626e3bcb6339025ccfb7bcd439dfcfb325e884e33da7cf3ffb5b6

      • memory/1572-0-0x0000000001000000-0x00000000011535B4-memory.dmp

        Filesize

        1.3MB

      • memory/1572-1-0x0000000001000000-0x00000000011535B4-memory.dmp

        Filesize

        1.3MB

      • memory/1572-2-0x0000000001000000-0x00000000011535B4-memory.dmp

        Filesize

        1.3MB

      • memory/1572-3-0x0000000001001000-0x000000000100B000-memory.dmp

        Filesize

        40KB

      • memory/1572-28-0x0000000001000000-0x00000000011535B4-memory.dmp

        Filesize

        1.3MB

      • memory/2584-21-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/2876-9-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/2876-12-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/2876-11-0x0000000000401000-0x0000000000408000-memory.dmp

        Filesize

        28KB

      • memory/3408-10-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

        Filesize

        4KB

      • memory/3408-14-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

        Filesize

        24KB