Analysis
-
max time kernel
7s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe
Resource
win7-20240903-en
Errors
General
-
Target
ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe
-
Size
7.6MB
-
MD5
ea90f24508b1f24a1f7b8081d31efc86
-
SHA1
8f452886be6dce2237ed2c7bd4b6035fcabb749d
-
SHA256
7cd39a8f167ef4fc41888164ae27558489e7873a3f93530f709161875f96b950
-
SHA512
82d9d12a427a6268c1566e2d5a02396a8424534c4ef4e8c2e2846de673573ff44ebc3382d0f5ad495d790e66fe30333e955a111eec66aec81a64a22a1c3f0cef
-
SSDEEP
49152:HE9XTMt36FsYEcZXeUR4ytjDSnSU6K5amsRHg4arAQbBJqDwa9cBzkVog+Hedo81:IsyzG5aVRHg4aRrqz9oyxOqo806wiWm
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine\Wine\Config ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\open ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\print\command ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Art ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Art\ShellNew ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\ = "Director Document" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\print ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EA90F2~1.EXE,1" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EA90F2~1.EXE /p \"%1\"" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\printto\command ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\printto ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EA90F2~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.art\ = "Director.Document" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\open\command ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EA90F2~1.EXE \"%1\"" ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Director.Document\DefaultIcon ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.art\ShellNew\NullFile ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3388 ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe 3388 ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe 3388 ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea90f24508b1f24a1f7b8081d31efc86_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4260,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:81⤵PID:2632