Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 10:04
Behavioral task
behavioral1
Sample
45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe
-
Size
550KB
-
MD5
45582114945d1fb2d4bc5a626f75bf60
-
SHA1
3f01f80dfe07cb420965175b3e192220ec5a6d9e
-
SHA256
f52f03178d1abedc256d9c4d1fee4ab5e417a65c4b069fc2ade8f464aed8f4bb
-
SHA512
725bba5a24b8e4ece2c3d7866e0a26a4a5ff7e7fd3f893d15151efc08fb9fdf2ef0131ccca26a241d9911a98b74fc807d480cc7288b8b1bdb4018bed610eb3be
-
SSDEEP
12288:V7UnT+Uyn8PbaT3fmHcsdszHIeCl5mh31A7WfTevqzInArL:V7KrynQDdsHCnmVNev6rrL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 server.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Wine 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x0000000000521000-memory.dmp themida behavioral1/memory/2080-5-0x0000000000400000-0x0000000000521000-memory.dmp themida behavioral1/memory/2080-4-0x0000000000400000-0x0000000000521000-memory.dmp themida behavioral1/memory/2080-41-0x0000000000400000-0x0000000000521000-memory.dmp themida -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\el.jpg 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\el.jpg DllHost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\server.exe 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe 2696 server.exe 2696 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2696 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2696 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2696 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2696 2080 45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe 30 PID 2696 wrote to memory of 1204 2696 server.exe 21 PID 2696 wrote to memory of 1204 2696 server.exe 21 PID 2696 wrote to memory of 1204 2696 server.exe 21 PID 2696 wrote to memory of 1204 2696 server.exe 21 PID 2696 wrote to memory of 1204 2696 server.exe 21 PID 2696 wrote to memory of 1204 2696 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45582114945d1fb2d4bc5a626f75bf60_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\server.exe"C:\Windows\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59016083302c650b69d27c64947eb7da5
SHA1c3d9441ccb6447af05e6d02b321c1c365a95f93d
SHA256989851962c21095087a4055ccf932dbcc811c4e55df2299a0a674821d67d51d7
SHA512870e8434a54f59ac1626010d6589e8d220ab863ddbcd7ac562c36c890fdc2be3917f2b265a05a773a1806185c9da60aa25d911a763509935a9e60ad8f2920806
-
Filesize
50KB
MD5565fe7180d135cb5e7b26f38a7319b4e
SHA1f92f55e5cb2589cfed7e6c6c4508cb11a622979c
SHA256d513fa5f9d9fd5e9a0f80ea3abf61e006445815e157405fb04d410005aed4713
SHA5123fd490c5ba8b69dc99a56b31a8ce3cd0a2da772010f9af9e8c8df16bc265bd77a37d0917bc15c5cbfd9af1c9133cd636b518476f89260e04dd8566752da01a08