Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fc75fe39fba7adf0830e75fa35e45b1b
-
SHA1
9b182af08e418b46545c7cf6f033c5b7ea749227
-
SHA256
c18510523c989c00055486d9d2ea22a457781c9fdb3ffee3bd7cb683b8c59009
-
SHA512
f8473dc51e6a89bf973e5d869979484e08f4a14ae8e71f6ff7dd989151000c30e0e24d09d85028cc3880fb60b50eded780772b32b3e98be5d752df301604fc74
-
SSDEEP
12288:5PNM9cM4pmckJQNFJj6TQfCi0Z/k8FVL+X7ByzdcsqPCPpS1rha4:4cM4cIF56Ipyc1mqPOSxha4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
services.exefc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
services.exefc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exeservices.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
Processes:
resource yara_rule \Windows\SysWOW64\winkey.dll aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2432 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
fservice.exeservices.exepid process 1624 fservice.exe 3016 services.exe -
Loads dropped DLL 6 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exeservices.exefservice.exepid process 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe 3016 services.exe 3016 services.exe 1624 fservice.exe 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exeservices.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 7 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exefservice.exeservices.exedescription ioc process File created C:\Windows\SysWOW64\fservice.exe fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe -
Drops file in Windows directory 8 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exefservice.exeservices.exedescription ioc process File opened for modification C:\Windows\system\sservice.exe fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File opened for modification C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
services.exepid process 3016 services.exe 3016 services.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exefservice.exeservices.exeNET.exedescription pid process target process PID 2872 wrote to memory of 1624 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe fservice.exe PID 2872 wrote to memory of 1624 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe fservice.exe PID 2872 wrote to memory of 1624 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe fservice.exe PID 2872 wrote to memory of 1624 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe fservice.exe PID 1624 wrote to memory of 3016 1624 fservice.exe services.exe PID 1624 wrote to memory of 3016 1624 fservice.exe services.exe PID 1624 wrote to memory of 3016 1624 fservice.exe services.exe PID 1624 wrote to memory of 3016 1624 fservice.exe services.exe PID 3016 wrote to memory of 2820 3016 services.exe NET.exe PID 3016 wrote to memory of 2820 3016 services.exe NET.exe PID 3016 wrote to memory of 2820 3016 services.exe NET.exe PID 3016 wrote to memory of 2820 3016 services.exe NET.exe PID 2872 wrote to memory of 2432 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe cmd.exe PID 2872 wrote to memory of 2432 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe cmd.exe PID 2872 wrote to memory of 2432 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe cmd.exe PID 2872 wrote to memory of 2432 2872 fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe cmd.exe PID 2820 wrote to memory of 2324 2820 NET.exe net1.exe PID 2820 wrote to memory of 2324 2820 NET.exe net1.exe PID 2820 wrote to memory of 2324 2820 NET.exe net1.exe PID 2820 wrote to memory of 2324 2820 NET.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exeC:\Windows\services.exe -XP3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\NET.exeNET STOP srservice4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe.bat2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fc75fe39fba7adf0830e75fa35e45b1b_JaffaCakes118.exe.batFilesize
133B
MD51d6181d50f15aa99547986d62f1c4f0a
SHA1784469b73157a95fe69d3b33a02da709ce2f0a30
SHA256f2768beb9414bb2a4a403491b060fb0bd3277fb894c3b899c36e0243427654ef
SHA51203c917591821e9a5187b61266b93507c6ade79d52efb82f95a78ef9184a9e72bd16c7529c946f5cc045b36684e02402b57018227a001183a25b87e86b69be23b
-
\Windows\SysWOW64\fservice.exeFilesize
1.9MB
MD5fc75fe39fba7adf0830e75fa35e45b1b
SHA19b182af08e418b46545c7cf6f033c5b7ea749227
SHA256c18510523c989c00055486d9d2ea22a457781c9fdb3ffee3bd7cb683b8c59009
SHA512f8473dc51e6a89bf973e5d869979484e08f4a14ae8e71f6ff7dd989151000c30e0e24d09d85028cc3880fb60b50eded780772b32b3e98be5d752df301604fc74
-
\Windows\SysWOW64\reginv.dllFilesize
21KB
MD522f292eae62c426c34a6c1a9c21242da
SHA156767cff957c90e9e86f6b5f8e4ba5edaeccae58
SHA25646d96fe9c478065d41010ebb4b077ea7fd010d5e840e6675db9a84158fe989c5
SHA512475132f67f6c4c1c07fa103021765cb774116e0877133b22b855a49030f6382e93cba89113fd21a8f297ea395a77b4e3348d3a7865e2359bb79aacd977bcc086
-
\Windows\SysWOW64\winkey.dllFilesize
13KB
MD594c1255035d207f763e97be615a6d04b
SHA1d3c3f44048865beb67364816dcf51bf742a51313
SHA256faf80bf3dafe9197b21f4d04c52c36921493e04da3ebbe0144f842f60456ec00
SHA5129eaf9244c9d14ad908a5db2e20ba89a832784948463b7687471793390cb51097e958b22738bf86b71aff559b0912df7522a1bb68d994015312dccbceb9964b28
-
memory/1624-13-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/1624-37-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/1624-35-0x0000000010000000-0x0000000010008000-memory.dmpFilesize
32KB
-
memory/1624-45-0x0000000010000000-0x0000000010008000-memory.dmpFilesize
32KB
-
memory/2872-47-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/2872-0-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2872-46-0x0000000010000000-0x0000000010008000-memory.dmpFilesize
32KB
-
memory/2872-48-0x0000000010000000-0x0000000010008000-memory.dmpFilesize
32KB
-
memory/3016-51-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-58-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-34-0x0000000000710000-0x0000000000718000-memory.dmpFilesize
32KB
-
memory/3016-26-0x0000000010000000-0x000000001000B000-memory.dmpFilesize
44KB
-
memory/3016-23-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/3016-52-0x0000000010000000-0x000000001000B000-memory.dmpFilesize
44KB
-
memory/3016-53-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/3016-54-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-56-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-30-0x0000000000710000-0x0000000000718000-memory.dmpFilesize
32KB
-
memory/3016-60-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-62-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-64-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-66-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-68-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-70-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-72-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-74-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-76-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB
-
memory/3016-78-0x0000000000400000-0x00000000005F4000-memory.dmpFilesize
2.0MB