Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 20:12

General

  • Target

    36356369d9902defa7b96c638c11b9b7_JaffaCakes118.exe

  • Size

    4.4MB

  • MD5

    36356369d9902defa7b96c638c11b9b7

  • SHA1

    9b1fb3f0b36b621416c58f9865bab765612fc665

  • SHA256

    dd432d50aa7213221a763637f06f8c93cea6564c04a1e96abb16114999d889af

  • SHA512

    a3af0944b3d91907bb7b54efd299299a19201a9ce3e7fe8f692fb2039ee4d0fc84ed23f469faadfda519e9c147e5118296c725077daef90715cd7ae792edc6d4

  • SSDEEP

    49152:CQa2sL5C6XabEu8BPXcZ483boCVxQgy9T4CdyLYN1:CN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36356369d9902defa7b96c638c11b9b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36356369d9902defa7b96c638c11b9b7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Roaming\mirc.exe
      "C:\Users\Admin\AppData\Roaming\mirc.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2336
    • C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\winlogon.exe
      2⤵
        PID:1840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\mirc.exe

      Filesize

      3.0MB

      MD5

      3857ca0324f4c6bc7e06f9b9947933fc

      SHA1

      9482daf24d91e3105f24bf48cdb58a97634fceee

      SHA256

      609e3ce23b530ec81ce01f1e01e5792b1e0e444742b59418a79d3773bdadde64

      SHA512

      876638a220c525dc089a2d7d5eb72fe84c6d60cf42d80aace22854051e89af1d897e07e2e6639df5e1ffad43efeef575e46a37d2e538eb3f4f2a8ceccd354ec7

    • memory/2316-0-0x000007FEF5CFE000-0x000007FEF5CFF000-memory.dmp

      Filesize

      4KB

    • memory/2316-1-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2316-2-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2316-3-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2316-12-0x000007FEF5CFE000-0x000007FEF5CFF000-memory.dmp

      Filesize

      4KB

    • memory/2316-13-0x000007FEF5A40000-0x000007FEF63DD000-memory.dmp

      Filesize

      9.6MB