Analysis
-
max time kernel
131s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
a46cba125a37801c9c77501ee21b145b
-
SHA1
9a50e8ae5bdaf6bf79c32aeb98b2ba42591f2ee0
-
SHA256
51f10247e92cf73a07aeb7539a5b2c57f09178c56809e2381ec83cab5134584c
-
SHA512
d8724c736cea4367d33180004cbda038c3c9439272c269379589428ee82493ca8798a69a0c946e692479ae40dd313472fbcf3ccc65e4501f9cce7eab4ea2ac17
-
SSDEEP
49152:iim6XvjHskdH/jChigyH8fGnDadV779GrFYdJ3:iiPvz1LChfMqV7hOYP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2220 seystm.exe 4776 seystm.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine seystm.exe -
resource yara_rule behavioral2/files/0x000900000002342e-4.dat themida behavioral2/memory/2220-12-0x0000000000400000-0x0000000000608000-memory.dmp themida behavioral2/memory/2220-19-0x0000000000400000-0x0000000000608000-memory.dmp themida behavioral2/memory/2220-24-0x0000000000400000-0x0000000000608000-memory.dmp themida behavioral2/memory/2220-18-0x0000000000400000-0x0000000000608000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2220 seystm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 4776 2220 seystm.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seystm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seystm.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2220 seystm.exe 2220 seystm.exe 4776 seystm.exe 4776 seystm.exe 4776 seystm.exe 4776 seystm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 seystm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2220 2848 a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe 85 PID 2848 wrote to memory of 2220 2848 a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe 85 PID 2848 wrote to memory of 2220 2848 a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 2220 wrote to memory of 4776 2220 seystm.exe 88 PID 4776 wrote to memory of 3416 4776 seystm.exe 56 PID 4776 wrote to memory of 3416 4776 seystm.exe 56 PID 4776 wrote to memory of 3416 4776 seystm.exe 56 PID 4776 wrote to memory of 3416 4776 seystm.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a46cba125a37801c9c77501ee21b145b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\seystm.exe"C:\Users\Admin\AppData\Local\Temp\seystm.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\seystm.exe"C:\Users\Admin\AppData\Local\Temp\seystm.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54edd225f35d9f7e7953f37d289ada155
SHA19e9ce10962df6e17690cee6db47282d35c164c01
SHA256cb9e084bdd5967152d30993f88c8143ed5c432ff263ea6aa98b7f5dba7bc1515
SHA5126655d30ffc3f45e9f46393fa8758b547312b500eef9c5df8752b080099598aad5dd2e507cc9679260d8091f72330e9c2a4d8a52d2d9187e3b1025bd1d1cd317e