Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 21:35
Behavioral task
behavioral1
Sample
4b807a2200e262dacfedfd13b3268d6c_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4b807a2200e262dacfedfd13b3268d6c_JaffaCakes118.dll
-
Size
788KB
-
MD5
4b807a2200e262dacfedfd13b3268d6c
-
SHA1
779dba0d28f7bf8e5f6e286634e3877650b6fabe
-
SHA256
330021012faddc9dec4446e5cdd45eaa4874bb7c9197dc3329db6e679753696e
-
SHA512
c60b205fbf4256cb564595f51f9e8f6eab12727d28d0875728cd20e9c645c3be7cfa69bce012a60a620f5beff2bb2001038869f8cc565bde07356163877338eb
-
SSDEEP
12288:c70CwlkzR1z4LLRxmT/HxaxpV5Nd/4KsGa9LUWK3CegMmGAfozkDrZLpqzVUeQR4:coC3Va+jYjfgKszDnMmGArxLoC3tu
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Wine rundll32.exe -
resource yara_rule behavioral1/memory/1356-2-0x0000000010000000-0x00000000101C1000-memory.dmp themida behavioral1/memory/1356-1-0x0000000010000000-0x00000000101C1000-memory.dmp themida behavioral1/memory/1356-0-0x0000000010000000-0x00000000101C1000-memory.dmp themida behavioral1/memory/1356-4-0x0000000010000000-0x00000000101C1000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1356 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1356 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31 PID 3004 wrote to memory of 1356 3004 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b807a2200e262dacfedfd13b3268d6c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b807a2200e262dacfedfd13b3268d6c_JaffaCakes118.dll,#12⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1356
-