Analysis
-
max time kernel
127s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:44
Behavioral task
behavioral1
Sample
f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe
-
Size
900KB
-
MD5
f6ea8db7c56caff29d082c81d02772a3
-
SHA1
401c926756817c2ad429ad046aa13b13378fd759
-
SHA256
bcaaeec6b79f274d1e408a40f54ebc926f8ad7e121f0f731a072ac3562dd5aa4
-
SHA512
d4e35c369c7229663398e0d31baccfe01d1ae33a385198e897174b8922c5aeacd77118b9407a9f1b9063d2ce9e6997b17af08cf4fe5222874ab87d2e2b526ebf
-
SSDEEP
24576:P0is7OBl7ywVmXgHDki0byWFTxOS/IUtc:BcOL7yomXtiO8H
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine notepad.exe -
resource yara_rule behavioral1/memory/1840-0-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/1840-3-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/1840-11-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-9-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/1840-6-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-13-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-14-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-15-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-17-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-28-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-38-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-37-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-36-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-35-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-34-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-33-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-32-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-31-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-30-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-29-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-27-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-26-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-25-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-24-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-23-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-21-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-20-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-19-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-18-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-16-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-22-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-40-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-39-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-41-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-45-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-46-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-44-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-43-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-42-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-74-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/memory/2320-75-0x0000000000400000-0x0000000000603000-memory.dmp themida behavioral1/files/0x0006000000016dca-76.dat themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\JvagfgA = "c:\\ProgramData\\WvaawhK\\MkuuoeO\\JvagfgA.exe" notepad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 2320 notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1840 set thread context of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 2320 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30 PID 1840 wrote to memory of 2320 1840 f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6ea8db7c56caff29d082c81d02772a3_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5f6ea8db7c56caff29d082c81d02772a3
SHA1401c926756817c2ad429ad046aa13b13378fd759
SHA256bcaaeec6b79f274d1e408a40f54ebc926f8ad7e121f0f731a072ac3562dd5aa4
SHA512d4e35c369c7229663398e0d31baccfe01d1ae33a385198e897174b8922c5aeacd77118b9407a9f1b9063d2ce9e6997b17af08cf4fe5222874ab87d2e2b526ebf