Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe
-
Size
62KB
-
MD5
067c1e91c7ebc1820121b13bf4f1299d
-
SHA1
2f27b2f2aa26f64649f3c0cd7d321f41c5c7e8db
-
SHA256
8e40da94312db8db62190d7bc6a80214a12727eae9f722b90de45c94a46e1b59
-
SHA512
9e4604114d9fd1d756d15ef2eca18319e9bbd6e08514605013a3a865dd04033ad526a5edfb64569e259f6261bc402c7d9609044471be8b784d8232dab17db423
-
SSDEEP
1536:SJfGN5wU8yGGmMvB1HG01VVEfvR7TnrHN:CoCL5M/G01VVkR7TnR
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchost\pARAMETERS\ServiceDll = "%SystemRoot%\\System32\\assxer.dll" 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\svchost\pARAMETERS\ServiceDll = "%SystemRoot%\\System32\\assxer.dll" 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\svchost\pARAMETERS\ServiceDll = "%SystemRoot%\\System32\\assxer.dll" 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1836 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4072 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe 1836 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0004abc0.001 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe File created C:\Windows\SysWOW64\assxer.dll 067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1836 svchost.exe 1836 svchost.exe 1836 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\067c1e91c7ebc1820121b13bf4f1299d_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
PID:4072
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k svchost1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3896 /prefetch:81⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD55616eb41e966b1bd5f332715e9760641
SHA1cfc51a8acdf30306916eafc9cbd957136bd62fdd
SHA256407009871ed6a472ec2178c833a18c9e7fa06d88ec3351373a8606cb04aea04c
SHA512fdfa21035593fe2dac1ec921366cdf67217d5ddcadf5904bd8e67dd8721db31b4d31f69cbd5ebc366bc9af9ec50e459a549c57f684a5304fd87b4180649882c3