Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:32
Behavioral task
behavioral1
Sample
f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
f638451ae289cc1f0aa0752513cd29bc
-
SHA1
6d6bdca66bbb84e44e9988f9816bf0a68c7c4f52
-
SHA256
48141214ec470e8c6a4a621585887d828fb77b7e703a236e555959bfbe67c062
-
SHA512
273005ea0e7a37e476189dad15c799614a0f6cc61df5b5bf5768249a3c20854f330cb3dd580d8a0168850f94baa008f9097a029857692ff5e107635055bc38f7
-
SSDEEP
49152:Xc2GXY9NoNdIkzA+VufOrVaWTfXQeSxZN8:XUXANoEkzA+VumrVaWmR8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2928 Decrypted.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe -
Loads dropped DLL 5 IoCs
pid Process 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe -
resource yara_rule behavioral1/memory/2704-0-0x0000000000400000-0x00000000005B4000-memory.dmp themida behavioral1/memory/2704-15-0x0000000000400000-0x00000000005B4000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2116 2928 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Decrypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2928 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2928 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2928 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2928 2704 f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe 30 PID 2928 wrote to memory of 2116 2928 Decrypted.exe 31 PID 2928 wrote to memory of 2116 2928 Decrypted.exe 31 PID 2928 wrote to memory of 2116 2928 Decrypted.exe 31 PID 2928 wrote to memory of 2116 2928 Decrypted.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f638451ae289cc1f0aa0752513cd29bc_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD59a050ed295d5132c34fdbb0194510b6c
SHA1c98f278f49cafdeba6eba630f44b9f79779ebd0e
SHA256489a832955b604e42ddff813fc0d7c0b1e3ad51ba6b5284bd70a01ee53777e7c
SHA512d168a3b7e84dfb30ea9130ab1e36f6ad766925e322cbdaae891e6816978857c13c2e2743100c211313f3efceb78c1ee48c120f3127e877e9f31719bff4b9c373