Analysis
-
max time kernel
148s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 03:25
Behavioral task
behavioral1
Sample
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
9cc53fd23f0b205ce8cec1b09f9be5e1
-
SHA1
5850cfecef77417838b98cda8ddd1bf70d1119aa
-
SHA256
5059042fb4202472f4ba6e61440f813c413f5adbfd6dafdf62cb53d4f89c91ee
-
SHA512
b233030e7377d727b6fed53033133ef2b358edcf4bd39f7a0ae73c9552a484c619c8b4538a09943e5423305a14395a8213b6d40f9da31bd6b17b9b97450731d4
-
SSDEEP
24576:FmBS3yLyp1+gtF2Q2pSYFTnvLUxF+4Nf:FUZooQ24YFTYx3x
Malware Config
Extracted
latentbot
atualizador.zapto.org
Signatures
-
Drops startup file 1 IoCs
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.lnk 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Wine 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2212-0-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-4-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-5-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-6-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-8-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-13-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-30-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-31-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-32-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-34-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-35-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-36-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-37-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-38-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-39-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-41-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-42-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-43-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-44-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-45-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-46-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-47-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-48-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-49-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-50-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2212-51-0x0000000000400000-0x0000000000678000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exepid Process 2212 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exepid Process 2212 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exepid Process 2212 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe 2212 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe 2212 9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9cc53fd23f0b205ce8cec1b09f9be5e1_JaffaCakes118.exe"1⤵
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2212