Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 06:12

General

  • Target

    2c46c6e79b001c4ed3b9535840644e40_JaffaCakes118.exe

  • Size

    881KB

  • MD5

    2c46c6e79b001c4ed3b9535840644e40

  • SHA1

    1bec5976194b01f3c461c0b28032317ecc0eba0e

  • SHA256

    bcd043de37e79c8f607252cb2b298bf8510a96bbe87ebf08a0190e1096c8d59a

  • SHA512

    77ab7b0d44531ba81c5cdb9181def4679bc621fb5ee655dca0711cf68568fe1d4fe002f6ca17b797d8fba2933ea33ca4164c90919420f32c16c06de34241f6f5

  • SSDEEP

    12288:NFaBKmr8z1O9nsvgU2AL0BuBuAiLiNRMAF2M725EyXKW9C2d3z1QH:aBv8z1O9svgVAIuBXzNlcMGhHny

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c46c6e79b001c4ed3b9535840644e40_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c46c6e79b001c4ed3b9535840644e40_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C19H28O2.ini

    Filesize

    130B

    MD5

    74f2830b6d95d80c760f6a9341dae690

    SHA1

    7e2ab58566b90c67541ad5e76bb8ebe2d8cc2489

    SHA256

    6476023c125163cc7fbe0e4f8b3f630807b3e8ffa173cca746a8eb0845c9b7b0

    SHA512

    dd4b8e78564f5da4c96966b2bc9dbe7ebfb0db8fe5b8c00fc401019ac487635d89b83e2b925e88149b32372cfd20185f1523f02f9ca84d89ab51bc0b455763a2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe

    Filesize

    352KB

    MD5

    b5948f16a03888d6d0666b2770994fca

    SHA1

    d8e3be423e9f47a1209bd69bd3bae188549e1628

    SHA256

    bc527070acd7169c0b875314b68f35a4c15a4a7c2cbc53df81397b00509c5277

    SHA512

    7da7187c96dc00a11f809585bbcbf1699c8de54a2443caceffa5d053c4e4593cf7603f8a7860423d0bb3fbea6bffc4944b9be7fe97907c72e402b5a5c3978811

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe

    Filesize

    815KB

    MD5

    5f75ec05a345216e8c92a7158600ed68

    SHA1

    5b53fd5cc983da638533a1ccb290f7c5ea97d53b

    SHA256

    1a0413a61f7d01c011edf878ca64c06952e14f914552f79cbe1e0bd132a80fa1

    SHA512

    e8ec2d45bd653e85d408a657d4e545189526a003de83a7d2a0eae01d506f0d989d0808b0c2cf0ec39d4df520124d13629edd1478391a7c2408e7b836eb14dfba

  • memory/2528-52-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2528-51-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2528-38-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2644-39-0x0000000000860000-0x0000000000A26000-memory.dmp

    Filesize

    1.8MB

  • memory/2644-10-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-18-0x0000000000A70000-0x0000000000B3F000-memory.dmp

    Filesize

    828KB

  • memory/2644-54-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-1-0x00000000011C0000-0x00000000011C1000-memory.dmp

    Filesize

    4KB

  • memory/2644-4-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-50-0x0000000000520000-0x000000000057A000-memory.dmp

    Filesize

    360KB

  • memory/2644-2-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-28-0x0000000000520000-0x000000000057A000-memory.dmp

    Filesize

    360KB

  • memory/2644-3-0x0000000000860000-0x0000000000A26000-memory.dmp

    Filesize

    1.8MB

  • memory/2644-37-0x0000000000520000-0x000000000057A000-memory.dmp

    Filesize

    360KB

  • memory/2644-34-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-0-0x0000000001000000-0x00000000011C53D4-memory.dmp

    Filesize

    1.8MB

  • memory/2644-13-0x0000000000A70000-0x0000000000B3F000-memory.dmp

    Filesize

    828KB

  • memory/2644-49-0x0000000000520000-0x000000000057A000-memory.dmp

    Filesize

    360KB

  • memory/2860-25-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2860-24-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2860-22-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2860-23-0x00000000004D0000-0x000000000059F000-memory.dmp

    Filesize

    828KB