Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 14:43

General

  • Target

    f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    f63cf673c657c4e270cd1a5f99b1a073

  • SHA1

    e5b6d55ff73b361f24acae40c6a46a675dd4fd7e

  • SHA256

    fabcd775df324d442b3d8f9dde456ce1a890d93f96ba021d8600f42c31125d47

  • SHA512

    943d6c1bbcb6e3d9a6c809263aa5a5d52de317d22b6029efa14ef79d3d82238aed0d9cd289939e1643e530a45803f8b799d7d7717d4fe3a671ef500eb9c7ae2d

  • SSDEEP

    24576:JQCxVclCQASgv5EH8e+909lecl7DL+fKf8/0ulqK5bo:JQ2Vc2Zv5EcZ9Olecl7+Kf8rV8

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\f63cf673c657c4e270cd1a5f99b1a073_JaffaCakes118.exe"
        3⤵
          PID:2592

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2276-14-0x0000000000400000-0x0000000000558000-memory.dmp

            Filesize

            1.3MB

          • memory/2276-2-0x0000000000560000-0x0000000000651000-memory.dmp

            Filesize

            964KB

          • memory/2276-1-0x0000000000260000-0x0000000000261000-memory.dmp

            Filesize

            4KB

          • memory/2276-3-0x0000000000401000-0x0000000000404000-memory.dmp

            Filesize

            12KB

          • memory/2276-0-0x0000000000400000-0x0000000000558000-memory.dmp

            Filesize

            1.3MB

          • memory/2276-13-0x0000000000401000-0x0000000000404000-memory.dmp

            Filesize

            12KB

          • memory/2276-8-0x0000000000400000-0x0000000000558000-memory.dmp

            Filesize

            1.3MB

          • memory/2572-6-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2572-9-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2572-11-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2572-4-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2572-16-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/2572-20-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB