Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 15:02

General

  • Target

    a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    a71ceb3d92be2ecc89b598b368d160d3

  • SHA1

    5f0f6ed78be3aac2255aa8b3a4d951d95171a2fe

  • SHA256

    3dc3caaad094ea5e9ecdd90ff2c67a6c4722e1fa1098f497ddad7137e3fc8f6f

  • SHA512

    02db011ee8ab3b0bf3b5471c9e22f4c39bfce34dd72cc34c9d1bc4332353085ab24129bbc0ced3c91db43e36d5ed1e8a1ff5d52c380baae06f7f1bb75f37e668

  • SSDEEP

    49152:q8mjn1VHaSNGzEADaKMPziZyn2/++OhS8o6fssYCb0nJNm:2nXaSNGZDaBKyna+hS8o6fssYPny

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Program Files\Internet Explorer\iexplore.exe
        C:\Windows\system32\system.exe
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:768 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7d9adb7be5ba2fbb6552b829510e2d03

          SHA1

          fb915e192f6cbd3a876eafd6bf9f3c52b8876485

          SHA256

          7f4fef4a63e97bb948aeb1e601a9d8a7945f2010f94ed9fbd74761093231e286

          SHA512

          103505cd57d59c8923e1aa1b32c872ef6f4b2172167746f25713df61e7dccb5acb15dab592f94e3b8ccc3a1e35af265a1d03eaa248f0a5274e14da405c00030f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          069703c069946f339e598638902d03e9

          SHA1

          4b728a103a6d139698ab23ad223c4258e42c2b07

          SHA256

          9057235f442f2820952f6d29439730112ed47df5267554f9c847057c1652e9c6

          SHA512

          54d9edeb88fc5629953f3585c76e81fe35ce1be6309267d3ce6b61f398217ea902b2ea1507a5427abc8c4ca8d0ebbb294f8bbdfff45c6aa81a57086ed7e845b7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2f42af7b2bc286dd2298ca43b6b9941b

          SHA1

          a7d6c9024ca90f40c3da341e4f8c5359a1d53b9d

          SHA256

          2857ae020ba3c384b23054851deb271ed5e20b09108a64cb47bf25f5d37a1be7

          SHA512

          ab0f7369265deef9ca7542108f87473642ef8e6dcc71ae43619134ac5fb6a9dac3aab32cb0dd2a845b1237b6ebe941d06a853d41239a63673c512b4938cf8b66

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b2895762c194cb8d77015c826f544004

          SHA1

          4f0862f5a57f10ae5c2a1630a975402849cbc2fc

          SHA256

          def8034aa41670e5f5e69c353d312320934b38a27809d9c37a3721e13fb85fea

          SHA512

          a0998af591c9ad0bb2eaf43a97cffc1d9918ecd4017f673ecf70060a7471fcdc064b0f4755ac05f4af2d2fed907041a80952ec690ff08bab8e2df9078d565043

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          40b55283fe15123a118d3d9407000d05

          SHA1

          54f4cc5c1afe696237433ef21a8a6c0e7b58c393

          SHA256

          d891e7f0df5ed24868d55e417714d4ca2beb9eec37a6ac2a5d84dfab10659e59

          SHA512

          0e01b98abcd6e0c35ee08114c0816760be56c25d0f248934e8a7d21bca25b952234fc77316580fd535320c548a395309650024c331c3071518a7f942866c37bd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          886ac8337b189f1a8e103646dac054c3

          SHA1

          0fdbb2c245978edc4ce79b6d966e7a02383c40c6

          SHA256

          e5568ae49e27ef994ef77324a484ecb3a5438aa630e83900b70a69644c27e176

          SHA512

          5221db30bce43816e5685f4b2abe9d88d476ee7cefa85bc40d4a9c6761f7ca7ee5dba49314400600f0ce69a25e3ba91ff9bbfca1959d4c5649f6190cb9f73e53

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fcf2c94ac0f4482a488b6eeee16b1621

          SHA1

          471fe62f0399ef729c030b01d567f409e8d0b5b7

          SHA256

          46d155a897b738e054d39c83b1b27a29a532300aee840f929642d60be8cd65a5

          SHA512

          08f2edaa08d4f4e4c42f2034bb8e66d256db4a1c11e7cc9931fcecc5e287c026223aa5480ee0c4df69cee9afc432acfb73babee2399fbb1cfc578ca6668331de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          df3617c20d372b73e746eab754f9a74b

          SHA1

          a28f1958cb09e866e5cdd600a28adede8d790fec

          SHA256

          71f0207c217790ced62e6713945242bdf937e7e81847d863a1f501ed782861b1

          SHA512

          79fecf50db2f5c001d934837e3d0557ced2d738ba0baef21a4471c49d162e101647723ece37b6e25fd428a2904b96d24a816ea534a1987c3d1ebba47609fd6f2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          976686834b56db65b036e5fc9f327116

          SHA1

          3dabef9ffc3ef6d5adc7130fa58aaf9d5769ae87

          SHA256

          2e772c3ffb050a132422a5d3c01ab99df03cd5f29b6d6e9bc04ff4d96eecfb06

          SHA512

          53414f1719cfdae32e024115e9fec4d5155016c534db5e0ab7c458c4f03a5d5edf134bda8b3657c3287ea0710fd4402dee8328da6a041bd1d324c7d3ffc833a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7034c998549254629d3fa5b62ddd41b3

          SHA1

          aded866f73db19fa74068f8f093db5c576b9895c

          SHA256

          58fda82ec5d00f5c4b470f6f8bf49732507e701c558e8b37522dc93efcbf2736

          SHA512

          5f1401becf4b8b00c4efd234766650b1d8cfddceb610c498b38aabf2377463a12f40d6af83ed4d57a80e56ed578765b36f5e6696ac8f3c5d36f1ce151aa3ac6b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          388e3ee3d1e3ac8e92f2a641ce356926

          SHA1

          6fd67629b22d3df9fd795be7210dcf248a8f79f5

          SHA256

          2f5b30eb5c8d4474af69cc4acd0a610619e1a798cd75fde76ef405ac64a5b4fd

          SHA512

          bb89e04630b6e5bc29b424a3d39871e1eacafd40bb4393cae71307f69a2427623d20cf916158288da3271b101b5ba57004e87dec5962cb3e75d2fc8de88ee098

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          744a9eb2237555b6dcfda53b1498b163

          SHA1

          64982508f02070f464b90cd05416531574f93bc0

          SHA256

          a8750b6cbceb675e2f03d1d71fa1a1c9dbf86a5ddf41fa3129fd1c528645d004

          SHA512

          9f8f13182d1dd59464d0fee03b45d6f484ab0c869afa32bef900fbbf31955bbea2168875922f94a0b0086e58cb9c27f3690ab5cc6f3a3325c7811c4dc9f9baad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9275c89f2350d11ddd7137f837121f0a

          SHA1

          61f07c8290db139d14222c1bf57746858baa57bd

          SHA256

          ad67e3cee833b28db9eab00db5a0b94459e6eb978b965fd3319ac4ed01fb145f

          SHA512

          8673763a47e847a04896649728d4e88bab55ef9220ff96481e206fa8e291fb780bdd4f5517088475465af1bdf33c1a87bb8cd5a758cbeb8670ce5857804fbc9e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ac0f3f29932aa65677ecb28c2bf7968d

          SHA1

          51501fdb00b35d632f5d91941cdb8e822fa92acc

          SHA256

          2a46f4134f9131d7b77ed943181e378569041733a195f6f9003e552c6446421f

          SHA512

          1db5137e9c2b1724ba297d4967ebf2492e3fe34c28e5c1724cde99c66ad1fae16e86c73fbc3d856fdec109824c723f78e86a6d5b8a970e07f96ccdc081b8aead

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d1387c50f6e36c95df43443aecfafebe

          SHA1

          2e36f6985992b8b00b984cca77a4c6130f9c804e

          SHA256

          cd088fc83ab1e2bf70b6b0bbd71c81b5d96f1fbbe16dbbedc3b58a8239692a73

          SHA512

          69677cd44f67e71e9e8f17c9c4a075d98a8c770e64b87d942c05e1cf2ab2ec0602451f5d57d73588969b9611b74c0a47a9bc3b3cff35ac399c2abd8643ee9407

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          75c5afe3062c8b0b967dfe8c91a09363

          SHA1

          da13816bf9b24dfc22ba14adc6fe6b216f71b744

          SHA256

          18a03ab69658719e342c9ae1af2402fc063d49ec86438f944bacba98813f60b3

          SHA512

          2e7c46f0b6bbf9ad8d2d3982fc4e7fc0ab40d1e2a2e05aea53e10334220b5753fe0445ddbfe3e59950f2db6b253f6fd2d4d163e3dd667c27cbe326fc9f3915ea

        • C:\Users\Admin\AppData\Local\Temp\CabE8EB.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarEBCC.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

          Filesize

          1.9MB

          MD5

          7649e3e001d49eac9b44cadb4975aa3c

          SHA1

          63a6de349bfab73e639ba52ca603c93d961360b0

          SHA256

          4992c8e39144c0a81a964350c18bed44559ad146e12f534ae6d61963ba323d53

          SHA512

          9085fd002979b30b5a8bbf22d8812066fdafd50f6eb9cfe2ea18186c7a62c241fd7fb5bfa1bacdee8ac87e968da3e43cf877ac12782d825f6cd3b69be5bbcea5

        • memory/1964-12-0x0000000010000000-0x00000000103E4000-memory.dmp

          Filesize

          3.9MB

        • memory/1964-8-0x0000000010000000-0x00000000103E4000-memory.dmp

          Filesize

          3.9MB

        • memory/2392-13-0x0000000010000000-0x00000000103E4000-memory.dmp

          Filesize

          3.9MB

        • memory/2392-14-0x00000000021D0000-0x000000000235C000-memory.dmp

          Filesize

          1.5MB

        • memory/2392-15-0x0000000010001000-0x0000000010005000-memory.dmp

          Filesize

          16KB

        • memory/2392-20-0x0000000010000000-0x00000000103E4000-memory.dmp

          Filesize

          3.9MB