Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe
-
Size
396KB
-
MD5
193966e2186ce5774d35859fd9aa2dd1
-
SHA1
7864ecc94e2c0ecd67554ccd00e816a510111c8f
-
SHA256
c6bbcd5f26895345892f51ceaa4c3df19571ccf6092b84a06994996248c869ac
-
SHA512
daa33331a7396780fb7f3c333b28801de4559e776b6086e96ebe4fe87f7949e7ad3396aea488587c566b56333fd526ac6693f39d58958011afb9f6ecc5fb489d
-
SSDEEP
6144:N8ETN+hTHUX2CvzeAes+cmhbqYglH8jXEmqzfdllGerRn2+KjqqrzTfAEcF:ZdvvzeAR+cwKxyXqfdimnuOq/kE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1252 spoolm.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Wine 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Wine spoolm.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\spoolm.exe 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\spoolm.exe 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\spoolm.exe spoolm.exe File created C:\Windows\SysWOW64\spoolm.exe spoolm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2580 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2580 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2580 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2580 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1252 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1252 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1252 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 30 PID 2132 wrote to memory of 1252 2132 193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\193966e2186ce5774d35859fd9aa2dd1_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sysremove.bat" "2⤵
- Deletes itself
PID:2580
-
-
C:\Windows\SysWOW64\spoolm.exe"C:\Windows\system32\spoolm.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313B
MD5b4e7d448a3a8ceed76fdd603f3d14546
SHA1380b189aa3f696d99a339a65bc2a127ccbf85c2b
SHA2565534295805d04cdc2eecbd149cd1e6ecea1cc35b535749d9b931e5a5bd7b7cae
SHA51226517add4afc533826b6c63020870c9cf11b6582fa702a8fbf1270fc4de7931bd71d390d49e2a9b90ba97e4f0771031dc659ce9af0335f0f3e4228d6f75dcf78
-
Filesize
396KB
MD5193966e2186ce5774d35859fd9aa2dd1
SHA17864ecc94e2c0ecd67554ccd00e816a510111c8f
SHA256c6bbcd5f26895345892f51ceaa4c3df19571ccf6092b84a06994996248c869ac
SHA512daa33331a7396780fb7f3c333b28801de4559e776b6086e96ebe4fe87f7949e7ad3396aea488587c566b56333fd526ac6693f39d58958011afb9f6ecc5fb489d