Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:35
Behavioral task
behavioral1
Sample
7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
7413b8b5420d6abf699fb38c3455cb28
-
SHA1
0e3f4134d41af75d6657570b0f3345bb8ec45a90
-
SHA256
009c7170a9089ee1df6685b592a6d8914889a1f0e0d620ae31a98b2c740c3f66
-
SHA512
60b23a6a0c2aecd0e692831758023392a043b73daf1781b066885833c135212b3dc7a14986256db909e91258eb41f46e4f39220cf63a8052a84879008085a1bd
-
SSDEEP
24576:nnSWZuzcdW+NHsZfPAfptAXC1oknWXsBU1WFBl7jOSzl14dEPYs8mNPCiu1fIUwE:nnSrctOnAfbAXC12sBRP7pzn4dUCiu1x
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4828-0-0x0000000000400000-0x00000000005C9000-memory.dmp themida behavioral2/memory/4828-5-0x0000000000400000-0x00000000005C9000-memory.dmp themida behavioral2/memory/4828-6-0x0000000000400000-0x00000000005C9000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3548 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 56 PID 4828 wrote to memory of 3548 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 56 PID 4828 wrote to memory of 3548 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 56 PID 4828 wrote to memory of 3548 4828 7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7413b8b5420d6abf699fb38c3455cb28_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828
-