Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
89ebdb34479358faaf02d64174807273_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
89ebdb34479358faaf02d64174807273_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
89ebdb34479358faaf02d64174807273
-
SHA1
89bb9874839305fe4846c33644555c8045254ef2
-
SHA256
662d13dac3ee6be9f1dfc56763d05be7edee89b993142249fbea96df6eb4b2d8
-
SHA512
1fec8c6e03c0e8c9023907fa43675ed85fa6922abeb7e1c988e853d578649ed7a999ddf9228cccd9375dcbf47e1e7e77a4ecd4b5da8101ce95cf110bf5227c4f
-
SSDEEP
24576:xS2Fm6rpxQox31TStFvD7vbihH5+/sJXA0DSs+pio584XSf5WpArUAIoUrwGP6:xS2Fm8xQYItJXvgw/sJQ0DStio05WyIx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
89ebdb34479358faaf02d64174807273_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 89ebdb34479358faaf02d64174807273_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
ADRENALINE THEMIDA TURKOJAN SEM UPX.EXEpid Process 5036 ADRENALINE THEMIDA TURKOJAN SEM UPX.EXE -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ADRENALINE THEMIDA TURKOJAN SEM UPX.EXEdescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ADRENALINE THEMIDA TURKOJAN SEM UPX.EXE -
Processes:
resource yara_rule behavioral2/files/0x000a000000023c12-4.dat themida behavioral2/memory/5036-9-0x0000000000400000-0x00000000006E7000-memory.dmp themida behavioral2/memory/5036-12-0x0000000000400000-0x00000000006E7000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
89ebdb34479358faaf02d64174807273_JaffaCakes118.exeADRENALINE THEMIDA TURKOJAN SEM UPX.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ebdb34479358faaf02d64174807273_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADRENALINE THEMIDA TURKOJAN SEM UPX.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
89ebdb34479358faaf02d64174807273_JaffaCakes118.exedescription pid Process procid_target PID 2148 wrote to memory of 5036 2148 89ebdb34479358faaf02d64174807273_JaffaCakes118.exe 84 PID 2148 wrote to memory of 5036 2148 89ebdb34479358faaf02d64174807273_JaffaCakes118.exe 84 PID 2148 wrote to memory of 5036 2148 89ebdb34479358faaf02d64174807273_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ebdb34479358faaf02d64174807273_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89ebdb34479358faaf02d64174807273_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\ADRENALINE THEMIDA TURKOJAN SEM UPX.EXE"C:\ADRENALINE THEMIDA TURKOJAN SEM UPX.EXE"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD520127125100139d4685810a37546b8c7
SHA1b11ed336bd7a42e17e37f3c566bc7dd35080b9a6
SHA2564aae740c70a9b67b1ac699a45ddc918ab09563daa1729fc894d7e851d415fcce
SHA512490adf33fd4812dcbdd5d181fc6fbb951a38e5b8f384c476d9cd18de1b8874b0de2ecd4cd70ea4ddad51d8d4363134bd10c6d71d7c925d9fab0c194afe25bbb8