Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
e143eacc43adcf0255f4617972cd8677
-
SHA1
3f2e6579ef5be5dd05084cfaf97f5fe4abc1bb64
-
SHA256
a7a76e945a13a5d9af8760bdd589d03d020ad02667c44457c03b0d131ba675f4
-
SHA512
ad0f848e07bd03ca2fcaaa7281c44628e5fd25373a769920802f317fa080cbad2defd4834c40aba866e3f90160c5192cb45127f84d1ef0c935a450efa1a835f9
-
SSDEEP
49152:yUTHRYXJcLbzSjIpXm0mpDpCOYL2sWN0r:yUj6JcLbz7m/Xku0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2624 MINKE-CLIENT.EXE 2676 MINKE-CLIENT.EXE -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 2676 2624 MINKE-CLIENT.EXE 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\MINKE-CLIENT.EXE e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe File created C:\Windows\ANGEL00260.JPG e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe File opened for modification C:\Windows\ANGEL00260.JPG DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINKE-CLIENT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2624 2412 e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2624 2412 e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2624 2412 e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe 31 PID 2412 wrote to memory of 2624 2412 e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32 PID 2624 wrote to memory of 2676 2624 MINKE-CLIENT.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e143eacc43adcf0255f4617972cd8677_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\MINKE-CLIENT.EXE"C:\Windows\MINKE-CLIENT.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\MINKE-CLIENT.EXEC:\Windows\MINKE-CLIENT.EXE3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5e8c287151152351584ffbfec101f8858
SHA18549d39742f62373fcff3561f594456471960867
SHA256c1f1dd49886818e3aac13c9f5a1a52e1eaa08cb368b9333f523f41f9946d41b0
SHA512117f72e854fa7cf74882644dff20d6f77de59abf771160cda89be059e35fa9d61c14897d17161c2b51234e370cc7f679bd247512ce9bfe94fd515449bb95ae37
-
Filesize
32KB
MD501cd0a862c65f6f09956caabf2086afe
SHA1e9711ced14409666a7e3ba5b6cb52439ae733950
SHA256ced732e0739997f92975d30f4a088f8b223fa2c7b44511ac4588751e2464d725
SHA512d808b616b775c8c672265d65d5cd9df2dcb9b73aa6c107edb5a7a2a303ed78ba7c6b06c7fb57134e279429a485d4ead5c0eacd7d5f877ad9f11b74890b4b7897