Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 13:34

General

  • Target

    2c8bff2e7d16ecaf7b482dabad323e6e_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    2c8bff2e7d16ecaf7b482dabad323e6e

  • SHA1

    c81a89a6883986d767d9fa0be45d767b009747eb

  • SHA256

    2e93055ac4a16f1053ccf1e753ecd6c49380e557e76625ef4a43f33c00d16bc7

  • SHA512

    d130057730bb80a062a7cbf5d06812291616f4c704103e339bb43014e595c410241044a9ff6020fdae86c8bd9607918c00a9c487b3c03750011b7dec86e9159e

  • SSDEEP

    49152:+WhS6tKQA2KwtM/a3veD+LOPqEIQ3OHapsF0X:to6tKQAhwtSa3GekqEIQey

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c8bff2e7d16ecaf7b482dabad323e6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c8bff2e7d16ecaf7b482dabad323e6e_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1688-0-0x0000000000400000-0x0000000000990000-memory.dmp

    Filesize

    5.6MB

  • memory/1688-1-0x0000000000401000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/1688-2-0x0000000000400000-0x0000000000990000-memory.dmp

    Filesize

    5.6MB

  • memory/1688-3-0x0000000000400000-0x0000000000990000-memory.dmp

    Filesize

    5.6MB

  • memory/1688-4-0x0000000000400000-0x0000000000990000-memory.dmp

    Filesize

    5.6MB