Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 04:52
Behavioral task
behavioral1
Sample
18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe
Resource
win7-20240220-en
7 signatures
150 seconds
General
-
Target
18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe
-
Size
852KB
-
MD5
18d696cca171bab74a506b22bfa5bb16
-
SHA1
586ef7cd5701a3b523ecc629ad2a64feeeaa2385
-
SHA256
d42942ec57cde6ed9469595e7a127f6060e34c0229b5b79be1322a98dba23bd5
-
SHA512
c3a4afc1f38a33e3fbb6e3167a30ae0674ad2e1fd4ca27a90d457db38ff0cd95073b3418fc6b561020cd90a5861b6a93a9f2faca1586c30330e4e86ca1892891
-
SSDEEP
24576:1ahQbER00iU4SrC2etdgT5UifHnR2tNVlz:1amy0C4v9ngT5xfHRkNzz
Score
7/10
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/3068-1-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/3068-5-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/3068-6-0x0000000000400000-0x0000000000525000-memory.dmp upx behavioral1/memory/3068-7-0x0000000000400000-0x0000000000525000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3068 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18d696cca171bab74a506b22bfa5bb16_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068