Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 17:32
Behavioral task
behavioral1
Sample
1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe
Resource
win7-20240611-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
1be3ba0abd9b712910e3f3fe8b12395f
-
SHA1
9217367b66ceb210579cc2f16d17a4609e84e31e
-
SHA256
6246b78d3aeb858ea75b0157a95f19d5d8239954a5765bcfef8045cf7e7d1787
-
SHA512
4d7232989f3c2adbc04be8b23b70ad1178e7e2c069e1a2c5fde12d0756df82b4feafde63c8e5afbd70663788c24cd1da2315215770bfef8ffcba845a0810a828
-
SSDEEP
49152:tVhzpmK7ph0csIVbJvZh0R2zpmTlsA6oCSQ92hlgGk8hZOIHzeo1pRTMzpIioWPU:zhVmgph8IV9vZxlmR6ld8Vk4Tvp+zORL
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Wine 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x00000000006BD000-memory.dmp themida behavioral1/memory/2068-3-0x0000000000400000-0x00000000006BD000-memory.dmp themida behavioral1/memory/2068-4-0x0000000000400000-0x00000000006BD000-memory.dmp themida behavioral1/memory/2068-9-0x0000000000400000-0x00000000006BD000-memory.dmp themida behavioral1/memory/2068-26-0x0000000000400000-0x00000000006BD000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21 PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21 PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21 PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21 PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21 PID 2068 wrote to memory of 1252 2068 1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1be3ba0abd9b712910e3f3fe8b12395f_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068
-