Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe
-
Size
677KB
-
MD5
002b9f0fc0c36a5bdaa2e7e7d64152b7
-
SHA1
a27e620de6ddf8e5f605d70fd5bb1f25ec1f1796
-
SHA256
73fefb5c219588cd054e5fa57c969119f5d8df3a005dd1bf3c14140bd53cf4c3
-
SHA512
4da2212f7a993ff0f2fd9f8379c9c0b64ee4b7311d31203fb5eb5c577ce255c2a3b17f7bb4339aba606c15140fad35e21ad70de8ab4dc9bfa5e888e7d2b635fd
-
SSDEEP
12288:8OEH+2IUmt/bHbxE6V6lW7+tYQAcjWnlVdn7mWYxDl8AIp9ys+3n7aTrg4Sf:7lamt/fW6V6VY7cqnlP7LYxJ8AGQX2gT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2876 server.exe 2584 server.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine server.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2876 server.exe 2584 server.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2876 server.exe 2876 server.exe 2876 server.exe 2876 server.exe 2876 server.exe 2876 server.exe 2584 server.exe 2584 server.exe 2584 server.exe 2584 server.exe 2584 server.exe 2584 server.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2876 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 92 PID 1572 wrote to memory of 2876 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 92 PID 1572 wrote to memory of 2876 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 92 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 2876 wrote to memory of 3408 2876 server.exe 56 PID 1572 wrote to memory of 2584 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 94 PID 1572 wrote to memory of 2584 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 94 PID 1572 wrote to memory of 2584 1572 002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe 94 PID 2584 wrote to memory of 3408 2584 server.exe 56 PID 2584 wrote to memory of 3408 2584 server.exe 56 PID 2584 wrote to memory of 3408 2584 server.exe 56 PID 2584 wrote to memory of 3408 2584 server.exe 56 PID 2584 wrote to memory of 3408 2584 server.exe 56 PID 2584 wrote to memory of 3408 2584 server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\002b9f0fc0c36a5bdaa2e7e7d64152b7_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4232,i,1305347165619645738,15927664461101562802,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:81⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789KB
MD5de87fd230a0a3d3da97ba2a6208f9641
SHA12a3cfdd72656431ba8c0f4b2acea8e5403a2bc82
SHA2560553b24691916f02f22bafa973b9631c73817e7df5b274a311bc661cd534c8eb
SHA512297a5d4d31d6f2c8999ee14ca474d238678ee02cccf12b7c1705a73022e45f23122f553a2d3626e3bcb6339025ccfb7bcd439dfcfb325e884e33da7cf3ffb5b6