Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 12:02
Behavioral task
behavioral1
Sample
608230e66a83f41de8c2e4979fae12ba_JaffaCakes118.dll
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
608230e66a83f41de8c2e4979fae12ba_JaffaCakes118.dll
-
Size
622KB
-
MD5
608230e66a83f41de8c2e4979fae12ba
-
SHA1
ad01bfd8a55a725c6782b494eee115126fde858a
-
SHA256
934f3267f0cfc4968eb6433ec1b16aea16042f1a20514378cefe640a8007d327
-
SHA512
a51eba2fa9027df048d126d6254886a6f6c3043209035a411b8a66bd38a7eb1b145d8dc4527f52fd2aeef6b52662e927a59fc82cf39498c95a8ebb2fa4dd3b3a
-
SSDEEP
12288:c6ataOeDRI7+auIg6mJIwVoWDgX8PPf0xeqHsE5x8l:c6fOeDRMbIoWDgX8/0xJsm8
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Wine rundll32.exe -
resource yara_rule behavioral1/memory/2956-1-0x0000000075120000-0x000000007528B000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2956 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30 PID 2028 wrote to memory of 2956 2028 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\608230e66a83f41de8c2e4979fae12ba_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\608230e66a83f41de8c2e4979fae12ba_JaffaCakes118.dll,#12⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2956
-