Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 18:08
Behavioral task
behavioral1
Sample
ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
ac0958e296e192602ea0936ea97856de
-
SHA1
8e4a42bad73a85416d5843549c0f2410162151b4
-
SHA256
ca41504c7e7853558706f8b3d5ce2f825ac13f382e212c9b64d25af412167acf
-
SHA512
d7cc6cf5667948fa3b8738d30cc6d6ededa10d289be832168a1e30c2c349e94ef6d1ce416737615f0db4f6b81f640067d268750c929bdd7c020c174a370d02a7
-
SSDEEP
49152:S/UncTcCiN5GLKOmlw0/XdDg9Bw4bDy1:S/opCE5UKO6JGZy1
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1728-0-0x0000000000400000-0x0000000000730000-memory.dmp themida behavioral1/memory/1728-4-0x0000000000400000-0x0000000000730000-memory.dmp themida behavioral1/memory/1728-6-0x0000000000400000-0x0000000000730000-memory.dmp themida behavioral1/memory/1728-7-0x0000000000400000-0x0000000000730000-memory.dmp themida behavioral1/memory/1728-9-0x0000000000400000-0x0000000000730000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\Arquivos de programas\\tempp\\pdf.exe" ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe 1728 ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac0958e296e192602ea0936ea97856de_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1728