Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 02:07

General

  • Target

    15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    15be839d4192a64c7ae5acaa80d897fa

  • SHA1

    bc7e2db894665e472179a649d48874c2adea07ff

  • SHA256

    e374e3322174548296d1b6c4fdcd8cb415328ee14fd2dd690579c384c0942c94

  • SHA512

    4c627c138bc889d6febc994bd21e6f2be2b72f3a5d4a79bdc5301508bbeedb2b1f9451bbd04b211defddf8ccfe47b7260cd3a5e368eaa9494d03effdf0a3b5f4

  • SSDEEP

    24576:u6mFBlaYARIRWidbqlIo50HuyHZZdQft68obHwClL7ljW1t4udlYs4HAzbR:uhFraMbolI20O8QglFjCVcs2Azb

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\91A5.tmp
      C:\Users\Admin\AppData\Local\Temp\91A5.tmp
      2⤵
      • Executes dropped EXE
      PID:324
    • C:\Users\Admin\AppData\Local\Temp\91A6.tmp
      C:\Users\Admin\AppData\Local\Temp\91A6.tmp
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\91A6.tmp

          Filesize

          1.4MB

          MD5

          9d8c98ea24a1f8906c9e7256b3032dec

          SHA1

          cf0ebbb9824e4a44b3b180e0e270ba205679bd05

          SHA256

          75bb57bdaee0df889f490bb4c6465e345fb629a78bf2d4b6172284a18f60fdd6

          SHA512

          3f0f222dd5116643469f4431e46646206f98337b6b38bd59c72d4c39211a4b4482589fdec9517aaca75e25b05a8c612f4194e06219232b57664f110a442365ab

        • \Users\Admin\AppData\Local\Temp\91A5.tmp

          Filesize

          328KB

          MD5

          dd1e0217a22cfbd29eb4db9f6a62d46b

          SHA1

          3d227378d89eaea8de00cd3ef96990d4ca00e561

          SHA256

          96fb88b3cbe104acfb58ffd27f5a428a13e8fe0dd43e5d76769fe93fa6a721e3

          SHA512

          bbfa5e3d5ad4afc4fdcd1c8befa4c59cf34cf4af752b7aead76e265cb786434370bb9b99993fbf61c772aa0f9a6f1523bb5f3db5cebacec4c38d11f2bb6b1fd9

        • memory/324-19-0x0000000000400000-0x0000000000523000-memory.dmp

          Filesize

          1.1MB

        • memory/1900-22-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/1900-28-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/2904-0-0x0000000000400000-0x00000000005CE000-memory.dmp

          Filesize

          1.8MB

        • memory/2904-1-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/2904-11-0x0000000002470000-0x0000000002593000-memory.dmp

          Filesize

          1.1MB

        • memory/2904-10-0x0000000002470000-0x0000000002593000-memory.dmp

          Filesize

          1.1MB

        • memory/2904-20-0x0000000002630000-0x0000000002952000-memory.dmp

          Filesize

          3.1MB

        • memory/2904-23-0x0000000000020000-0x000000000002B000-memory.dmp

          Filesize

          44KB

        • memory/2904-25-0x0000000000400000-0x00000000005CE000-memory.dmp

          Filesize

          1.8MB