Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:13
Behavioral task
behavioral1
Sample
d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
d33650d7fc2fa8eb571b4bd0e8c7e7d0
-
SHA1
70fa2e3ad1b02d6e838637e5bcacedbe32a82375
-
SHA256
4c9474b107aba88632e46fd79d37a561927c5a01c2583b0245db57bc72038261
-
SHA512
16cbbe90bf84678a1b7c5301f6a869a81935bc5494523311850b0fa12da40d5df6aeee8d9af4f5d21911c20a29ef1e1f425e4a496f7f47c51b2beb10e2cbdd48
-
SSDEEP
24576:4gc6H6J6gBPaOFfVGcLXzjlLBgp803owAcOiKpy7yzRBPc6dPCH4dG:4RYbeFf0cDlVgFQiKpy2zRB0BYdG
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2824 speedwin.exe 2728 speedwin.exe 1900 speedwin.exe 2176 speedwin.exe 904 speedwin.exe 2628 speedwin.exe 2804 speedwin.exe 2228 speedwin.exe 1076 speedwin.exe 2356 speedwin.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine speedwin.exe -
Loads dropped DLL 20 IoCs
pid Process 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 2824 speedwin.exe 2824 speedwin.exe 2728 speedwin.exe 2728 speedwin.exe 1900 speedwin.exe 1900 speedwin.exe 2176 speedwin.exe 2176 speedwin.exe 904 speedwin.exe 904 speedwin.exe 2628 speedwin.exe 2628 speedwin.exe 2804 speedwin.exe 2804 speedwin.exe 2228 speedwin.exe 2228 speedwin.exe 1076 speedwin.exe 1076 speedwin.exe -
resource yara_rule behavioral1/memory/2656-0-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2656-4-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2656-8-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/files/0x000c000000012268-15.dat themida behavioral1/memory/2824-19-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-18-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-21-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-24-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-23-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-25-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-26-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-27-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-28-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2824-32-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-36-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-35-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-38-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-39-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-41-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-40-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-42-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-43-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-44-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1900-49-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2728-48-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1900-52-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1900-53-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1900-56-0x0000000004CE0000-0x0000000005018000-memory.dmp themida behavioral1/memory/2176-58-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1900-60-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2176-61-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2176-62-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2176-66-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/904-67-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/904-68-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2628-72-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/904-73-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2628-75-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2628-74-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2804-80-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2628-79-0x0000000004A90000-0x0000000004DC8000-memory.dmp themida behavioral1/memory/2628-81-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2804-82-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2804-83-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2228-87-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2804-88-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2228-89-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2228-90-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1076-94-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2228-95-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1076-96-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1076-97-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/1076-102-0x0000000000400000-0x0000000000738000-memory.dmp themida behavioral1/memory/2356-103-0x0000000000400000-0x0000000000738000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File created C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe File opened for modification C:\Windows\SysWOW64\speedwin.exe speedwin.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language speedwin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 2824 speedwin.exe 2728 speedwin.exe 1900 speedwin.exe 2176 speedwin.exe 904 speedwin.exe 2628 speedwin.exe 2804 speedwin.exe 2228 speedwin.exe 1076 speedwin.exe 2356 speedwin.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2824 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2824 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2824 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2824 2656 d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2728 2824 speedwin.exe 31 PID 2824 wrote to memory of 2728 2824 speedwin.exe 31 PID 2824 wrote to memory of 2728 2824 speedwin.exe 31 PID 2824 wrote to memory of 2728 2824 speedwin.exe 31 PID 2728 wrote to memory of 1900 2728 speedwin.exe 32 PID 2728 wrote to memory of 1900 2728 speedwin.exe 32 PID 2728 wrote to memory of 1900 2728 speedwin.exe 32 PID 2728 wrote to memory of 1900 2728 speedwin.exe 32 PID 1900 wrote to memory of 2176 1900 speedwin.exe 33 PID 1900 wrote to memory of 2176 1900 speedwin.exe 33 PID 1900 wrote to memory of 2176 1900 speedwin.exe 33 PID 1900 wrote to memory of 2176 1900 speedwin.exe 33 PID 2176 wrote to memory of 904 2176 speedwin.exe 34 PID 2176 wrote to memory of 904 2176 speedwin.exe 34 PID 2176 wrote to memory of 904 2176 speedwin.exe 34 PID 2176 wrote to memory of 904 2176 speedwin.exe 34 PID 904 wrote to memory of 2628 904 speedwin.exe 35 PID 904 wrote to memory of 2628 904 speedwin.exe 35 PID 904 wrote to memory of 2628 904 speedwin.exe 35 PID 904 wrote to memory of 2628 904 speedwin.exe 35 PID 2628 wrote to memory of 2804 2628 speedwin.exe 37 PID 2628 wrote to memory of 2804 2628 speedwin.exe 37 PID 2628 wrote to memory of 2804 2628 speedwin.exe 37 PID 2628 wrote to memory of 2804 2628 speedwin.exe 37 PID 2804 wrote to memory of 2228 2804 speedwin.exe 38 PID 2804 wrote to memory of 2228 2804 speedwin.exe 38 PID 2804 wrote to memory of 2228 2804 speedwin.exe 38 PID 2804 wrote to memory of 2228 2804 speedwin.exe 38 PID 2228 wrote to memory of 1076 2228 speedwin.exe 39 PID 2228 wrote to memory of 1076 2228 speedwin.exe 39 PID 2228 wrote to memory of 1076 2228 speedwin.exe 39 PID 2228 wrote to memory of 1076 2228 speedwin.exe 39 PID 1076 wrote to memory of 2356 1076 speedwin.exe 40 PID 1076 wrote to memory of 2356 1076 speedwin.exe 40 PID 1076 wrote to memory of 2356 1076 speedwin.exe 40 PID 1076 wrote to memory of 2356 1076 speedwin.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 628 "C:\Users\Admin\AppData\Local\Temp\d33650d7fc2fa8eb571b4bd0e8c7e7d0_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 708 "C:\Windows\SysWOW64\speedwin.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 712 "C:\Windows\SysWOW64\speedwin.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 724 "C:\Windows\SysWOW64\speedwin.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 720 "C:\Windows\SysWOW64\speedwin.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 740 "C:\Windows\SysWOW64\speedwin.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 732 "C:\Windows\SysWOW64\speedwin.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 728 "C:\Windows\SysWOW64\speedwin.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 744 "C:\Windows\SysWOW64\speedwin.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\speedwin.exeC:\Windows\system32\speedwin.exe 716 "C:\Windows\SysWOW64\speedwin.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d33650d7fc2fa8eb571b4bd0e8c7e7d0
SHA170fa2e3ad1b02d6e838637e5bcacedbe32a82375
SHA2564c9474b107aba88632e46fd79d37a561927c5a01c2583b0245db57bc72038261
SHA51216cbbe90bf84678a1b7c5301f6a869a81935bc5494523311850b0fa12da40d5df6aeee8d9af4f5d21911c20a29ef1e1f425e4a496f7f47c51b2beb10e2cbdd48