Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 10:21
Static task
static1
Behavioral task
behavioral1
Sample
4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
4566a0335e88e607bdc80854bd7c18b8
-
SHA1
67776f23067b094919e2649678efab9ea5561741
-
SHA256
ccbde413a1b675fbf1d5fa0c628312c2abd9609ab0055e1174fbe13c5e04dae5
-
SHA512
b9bb4a358056a9c4592ebf038c203ab9ea8435d0d08f90724edfa156e4b668530942ce425d9b5961122212e167e5eb9a5d2b51b2647984a66fc80dcc1fc1ae03
-
SSDEEP
24576:wHshkdggBuYDi92N5ffXfVjFUJwmNOHdwcpBeCrYu0xH4erIWBHEQMV/XMO67Y/:P6NTc2fftjYnYM0YV4U2tB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1844 WinRoot32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinRoot32.exe 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 WinRoot32.exe 1844 WinRoot32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1844 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe 29 PID 1092 wrote to memory of 1844 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe 29 PID 1092 wrote to memory of 1844 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe 29 PID 1092 wrote to memory of 1844 1092 4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe 29 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20 PID 1844 wrote to memory of 1208 1844 WinRoot32.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4566a0335e88e607bdc80854bd7c18b8_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WinRoot32.exeC:\Windows\system32\WinRoot32.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD56a9632f77ce1ec39313103955d76ba24
SHA164275283b30cf306b0dc6123b5477c9f818216c4
SHA256b23bcd6024d5c072d55dcb8035f2a0cd924340a84cde79902b4ab85628743202
SHA512ef82109e9b04552997bc86a435041439c5dc57b3767c3c6c9c0792cbc1437fa1183c9829b8c35d85d5ee8bbb815a52f807a8c7dfd26a72985bd073233fb7a425