Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 03:49
Behavioral task
behavioral1
Sample
76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe
-
Size
672KB
-
MD5
76f15f9b6273cbfdc48ce722cbbeb8c1
-
SHA1
77c8fcbcb4ee1d8aeb99ea0be6728711d89a24f9
-
SHA256
1b264761c1271ba608c3c9905f108402447845cf5db50ae10b3946741425a8e5
-
SHA512
5bc68ce1d09b22eb9a98e565215e703cf2941aa0941f6c6500366fb24efeb5972e1676df86d8bd297232c0f1c6904589b386d45ef1c525628e3c1d4babb169dd
-
SSDEEP
12288:XeaN0A6SxUpoLSlvamDE/hZwASQ3iOmLJnA+Q5qCtUrKCJUOOl7/6m:uahxuQOU//wAl3iOaJFMfjCUym
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2284 netdll32.exe 1912 netdll32.exe 2660 netdll32.exe 1624 netdll32.exe 1632 netdll32.exe 2304 netdll32.exe 2552 netdll32.exe 2864 netdll32.exe 1500 netdll32.exe 3028 netdll32.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine netdll32.exe -
Loads dropped DLL 20 IoCs
pid Process 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 2284 netdll32.exe 2284 netdll32.exe 1912 netdll32.exe 1912 netdll32.exe 2660 netdll32.exe 2660 netdll32.exe 1624 netdll32.exe 1624 netdll32.exe 1632 netdll32.exe 1632 netdll32.exe 2304 netdll32.exe 2304 netdll32.exe 2552 netdll32.exe 2552 netdll32.exe 2864 netdll32.exe 2864 netdll32.exe 1500 netdll32.exe 1500 netdll32.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/files/0x00080000000120ff-9.dat themida behavioral1/memory/2408-6-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2408-13-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2284-15-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2284-20-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2284-19-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2284-21-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1912-28-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2284-25-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1912-31-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1912-30-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1912-32-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1912-35-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2660-37-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2660-40-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2660-39-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2660-41-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2660-45-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1624-47-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1624-49-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1624-52-0x0000000004BE0000-0x0000000004E09000-memory.dmp themida behavioral1/memory/1624-54-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1632-55-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2304-59-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1632-60-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2304-61-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2552-65-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2304-66-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2552-67-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2864-71-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2552-72-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2864-73-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1500-77-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/2864-78-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1500-79-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/3028-83-0x0000000000400000-0x0000000000629000-memory.dmp themida behavioral1/memory/1500-84-0x0000000000400000-0x0000000000629000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File created C:\Windows\SysWOW64\netdll32.exe netdll32.exe File opened for modification C:\Windows\SysWOW64\netdll32.exe netdll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 2284 netdll32.exe 1912 netdll32.exe 2660 netdll32.exe 1624 netdll32.exe 1632 netdll32.exe 2304 netdll32.exe 2552 netdll32.exe 2864 netdll32.exe 1500 netdll32.exe 3028 netdll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netdll32.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 2284 netdll32.exe 1912 netdll32.exe 2660 netdll32.exe 1624 netdll32.exe 1632 netdll32.exe 2304 netdll32.exe 2552 netdll32.exe 2864 netdll32.exe 1500 netdll32.exe 3028 netdll32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2284 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2284 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2284 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2284 2408 76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe 30 PID 2284 wrote to memory of 1912 2284 netdll32.exe 32 PID 2284 wrote to memory of 1912 2284 netdll32.exe 32 PID 2284 wrote to memory of 1912 2284 netdll32.exe 32 PID 2284 wrote to memory of 1912 2284 netdll32.exe 32 PID 1912 wrote to memory of 2660 1912 netdll32.exe 33 PID 1912 wrote to memory of 2660 1912 netdll32.exe 33 PID 1912 wrote to memory of 2660 1912 netdll32.exe 33 PID 1912 wrote to memory of 2660 1912 netdll32.exe 33 PID 2660 wrote to memory of 1624 2660 netdll32.exe 34 PID 2660 wrote to memory of 1624 2660 netdll32.exe 34 PID 2660 wrote to memory of 1624 2660 netdll32.exe 34 PID 2660 wrote to memory of 1624 2660 netdll32.exe 34 PID 1624 wrote to memory of 1632 1624 netdll32.exe 35 PID 1624 wrote to memory of 1632 1624 netdll32.exe 35 PID 1624 wrote to memory of 1632 1624 netdll32.exe 35 PID 1624 wrote to memory of 1632 1624 netdll32.exe 35 PID 1632 wrote to memory of 2304 1632 netdll32.exe 36 PID 1632 wrote to memory of 2304 1632 netdll32.exe 36 PID 1632 wrote to memory of 2304 1632 netdll32.exe 36 PID 1632 wrote to memory of 2304 1632 netdll32.exe 36 PID 2304 wrote to memory of 2552 2304 netdll32.exe 37 PID 2304 wrote to memory of 2552 2304 netdll32.exe 37 PID 2304 wrote to memory of 2552 2304 netdll32.exe 37 PID 2304 wrote to memory of 2552 2304 netdll32.exe 37 PID 2552 wrote to memory of 2864 2552 netdll32.exe 38 PID 2552 wrote to memory of 2864 2552 netdll32.exe 38 PID 2552 wrote to memory of 2864 2552 netdll32.exe 38 PID 2552 wrote to memory of 2864 2552 netdll32.exe 38 PID 2864 wrote to memory of 1500 2864 netdll32.exe 39 PID 2864 wrote to memory of 1500 2864 netdll32.exe 39 PID 2864 wrote to memory of 1500 2864 netdll32.exe 39 PID 2864 wrote to memory of 1500 2864 netdll32.exe 39 PID 1500 wrote to memory of 3028 1500 netdll32.exe 40 PID 1500 wrote to memory of 3028 1500 netdll32.exe 40 PID 1500 wrote to memory of 3028 1500 netdll32.exe 40 PID 1500 wrote to memory of 3028 1500 netdll32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 676 "C:\Users\Admin\AppData\Local\Temp\76f15f9b6273cbfdc48ce722cbbeb8c1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 736 "C:\Windows\SysWOW64\netdll32.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 740 "C:\Windows\SysWOW64\netdll32.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 748 "C:\Windows\SysWOW64\netdll32.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 756 "C:\Windows\SysWOW64\netdll32.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 752 "C:\Windows\SysWOW64\netdll32.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 768 "C:\Windows\SysWOW64\netdll32.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 764 "C:\Windows\SysWOW64\netdll32.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 780 "C:\Windows\SysWOW64\netdll32.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\netdll32.exeC:\Windows\system32\netdll32.exe 772 "C:\Windows\SysWOW64\netdll32.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD576f15f9b6273cbfdc48ce722cbbeb8c1
SHA177c8fcbcb4ee1d8aeb99ea0be6728711d89a24f9
SHA2561b264761c1271ba608c3c9905f108402447845cf5db50ae10b3946741425a8e5
SHA5125bc68ce1d09b22eb9a98e565215e703cf2941aa0941f6c6500366fb24efeb5972e1676df86d8bd297232c0f1c6904589b386d45ef1c525628e3c1d4babb169dd