Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
15be839d4192a64c7ae5acaa80d897fa
-
SHA1
bc7e2db894665e472179a649d48874c2adea07ff
-
SHA256
e374e3322174548296d1b6c4fdcd8cb415328ee14fd2dd690579c384c0942c94
-
SHA512
4c627c138bc889d6febc994bd21e6f2be2b72f3a5d4a79bdc5301508bbeedb2b1f9451bbd04b211defddf8ccfe47b7260cd3a5e368eaa9494d03effdf0a3b5f4
-
SSDEEP
24576:u6mFBlaYARIRWidbqlIo50HuyHZZdQft68obHwClL7ljW1t4udlYs4HAzbR:uhFraMbolI20O8QglFjCVcs2Azb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 324 91A5.tmp 1900 91A6.tmp -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine 91A6.tmp -
Loads dropped DLL 4 IoCs
pid Process 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91A6.tmp -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1900 91A6.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91A6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 1900 91A6.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 324 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 29 PID 2904 wrote to memory of 324 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 29 PID 2904 wrote to memory of 324 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 29 PID 2904 wrote to memory of 324 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 29 PID 2904 wrote to memory of 1900 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 30 PID 2904 wrote to memory of 1900 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 30 PID 2904 wrote to memory of 1900 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 30 PID 2904 wrote to memory of 1900 2904 15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15be839d4192a64c7ae5acaa80d897fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\91A5.tmpC:\Users\Admin\AppData\Local\Temp\91A5.tmp2⤵
- Executes dropped EXE
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\91A6.tmpC:\Users\Admin\AppData\Local\Temp\91A6.tmp2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59d8c98ea24a1f8906c9e7256b3032dec
SHA1cf0ebbb9824e4a44b3b180e0e270ba205679bd05
SHA25675bb57bdaee0df889f490bb4c6465e345fb629a78bf2d4b6172284a18f60fdd6
SHA5123f0f222dd5116643469f4431e46646206f98337b6b38bd59c72d4c39211a4b4482589fdec9517aaca75e25b05a8c612f4194e06219232b57664f110a442365ab
-
Filesize
328KB
MD5dd1e0217a22cfbd29eb4db9f6a62d46b
SHA13d227378d89eaea8de00cd3ef96990d4ca00e561
SHA25696fb88b3cbe104acfb58ffd27f5a428a13e8fe0dd43e5d76769fe93fa6a721e3
SHA512bbfa5e3d5ad4afc4fdcd1c8befa4c59cf34cf4af752b7aead76e265cb786434370bb9b99993fbf61c772aa0f9a6f1523bb5f3db5cebacec4c38d11f2bb6b1fd9