Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 08:13

General

  • Target

    27dc6b3f41d7a3c0455f4147234be0e0_JaffaCakes118.exe

  • Size

    664KB

  • MD5

    27dc6b3f41d7a3c0455f4147234be0e0

  • SHA1

    d958d5f0d13a5175a66645a34843423e7f5e4ece

  • SHA256

    c7caa041ca930baf0cb3ef335b78c9e8f974a70ed0467d02d8d0123b75a3da30

  • SHA512

    9acb8e19586db457ce04fb560827fccec68390f609899367b963fc43308914d42e93ee1f92c265c4a1999b92f05d90b1044b2d9bde509fc235c33fd376121ca4

  • SSDEEP

    12288:BHnW5AirU08MxpsuiA3dV9YsDXBQ0gV7InWLapR0YwWMjiQBOe6+:5nW5rlvxAM/DRQ0O7In0wR0YAjJBO7+

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27dc6b3f41d7a3c0455f4147234be0e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27dc6b3f41d7a3c0455f4147234be0e0_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    PID:3920
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4432,i,4226873509039249198,15952596839998010243,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:8
    1⤵
      PID:1104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3920-0-0x0000000000400000-0x000000000061B000-memory.dmp

      Filesize

      2.1MB

    • memory/3920-1-0x0000000000400000-0x000000000061B000-memory.dmp

      Filesize

      2.1MB