Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 10:26
Behavioral task
behavioral1
Sample
07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe
-
Size
8.1MB
-
MD5
07f55e1e2cb8a3fc094bbe5026c3df21
-
SHA1
cae9d0f637f08f46486007ba49eeff7568a59893
-
SHA256
b3789019bc7ecce1616b06a69095decbbce8b2fa57c9d58883158b812d467299
-
SHA512
f9b87179335a4f9d433d832b4b63dfc22fe669dd543b40c3902be3f6c6598d1a1a3d0896efcfc5a4a688870851f9b0aa53439b13fa1a6e1b97bfbcaeb2dd7235
-
SSDEEP
196608:aT4nKcwQpqrGptJWSz4xNVSl24BngpGxM4FnoMjd:aTCNwQpCitkJaVGo5Foe
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\msmqinst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe" 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\nscygmbn.sys wingb.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\csdlomd\ImagePath = "system32\\drivers\\nscygmbn.sys" wingb.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 wingb.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 cmd.exe -
resource yara_rule behavioral1/memory/2860-0-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-2-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-3-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-4-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-5-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-6-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-7-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-8-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-9-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-10-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-11-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2688-18-0x0000000002390000-0x0000000002644000-memory.dmp themida behavioral1/memory/2860-26-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-28-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-29-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-30-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-32-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-33-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-34-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-35-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-36-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-37-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-38-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-39-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-40-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-41-0x0000000000890000-0x0000000001255000-memory.dmp themida behavioral1/memory/2860-42-0x0000000000890000-0x0000000001255000-memory.dmp themida -
resource yara_rule behavioral1/files/0x002f000000014f57-14.dat upx behavioral1/memory/2420-24-0x0000000000400000-0x00000000006B4000-memory.dmp upx behavioral1/memory/2420-25-0x0000000000400000-0x00000000006B4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Cleanup = "C:\\cleanup.exe" wingb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\const 1.0.0 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe File created C:\Windows\SysWOW64\aiyiqweg.txt wingb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Help\wuau\wingb.exe 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe File created C:\WINDOWS\Help\wuau\wingb.txt 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2420 wingb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 wingb.exe 2420 wingb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2688 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2688 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2688 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2688 2860 07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe 28 PID 2688 wrote to memory of 2420 2688 cmd.exe 30 PID 2688 wrote to memory of 2420 2688 cmd.exe 30 PID 2688 wrote to memory of 2420 2688 cmd.exe 30 PID 2688 wrote to memory of 2420 2688 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07f55e1e2cb8a3fc094bbe5026c3df21_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /k C:\WINDOWS\Help\wuau\wingb.exe /nogui C:\WINDOWS\Help\wuau\wingb.txt2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\WINDOWS\Help\wuau\wingb.exeC:\WINDOWS\Help\wuau\wingb.exe /nogui C:\WINDOWS\Help\wuau\wingb.txt3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf991952063458eeca50ef7043366ca3
SHA124c5f7f27a743f81f82c294245eaebf90c794d63
SHA2569870aa05cf14a87da50c108c72674d912542efcad9b8b076056f97d8a4a33fde
SHA51273e8e942b2951b788c2529cac2eeeffae38813efd038f6c5705d74f3723ba5d79ee9ffd0878f32cc8d9df2549d575315a4fae6c030af4940bcd7f78bf3c07d67
-
Filesize
574B
MD5f729045a51896f374fee1ab23eb8fe7f
SHA162890664667b1f3361eadf1d7c4bf61ae0477370
SHA25640bf96d24a051c9fd666c603e29ce70e1dab97feea0406fd32a167bb44c2c8c6
SHA51240b7fd24237046761700364e4d3be4fff69913862385d1833d43430a90b0b90ca0762b8c971bda16ec8c6c936f344a5898375212b25073ae2f9e7932efac9c36
-
Filesize
714KB
MD530f3680e007d924960fd65524de36601
SHA123f1e67e28052188432d2031335a79cb5ae72a8f
SHA2566485271fe48f7be4cb49735c60fa4cf2ff52f235e2b24bfba22df6ea75fda1d7
SHA51233323b60353430962ef0e07dd166625ae8cb1d2080f75859d35cf0c807d146ccd7272feef37ebbe8ce77f988658ef0dee6602f9b1bcf429cd0c1898862b5091a