Analysis

  • max time kernel
    140s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 07:26

General

  • Target

    072dacdbb99949e8237decd36da652dd_JaffaCakes118.exe

  • Size

    105KB

  • MD5

    072dacdbb99949e8237decd36da652dd

  • SHA1

    49aa7075aa6d7c809c435188d7e748a704bddc7f

  • SHA256

    73585470253818734406a30de623f57d2a1ace0ebdda71d615e5bf7beebe684c

  • SHA512

    eada7ae7766ddf7823fa78db1d4e2b97d08876b6a9edd97698b54ca2a621f0f96a3d65924f1e46b65734f2e1d90211cf9494959d01b9804d32825b0f2a14f4b0

  • SSDEEP

    1536:JTpxQaklLkdbbCzJ7VyzypXbPvt/eZHcpUAIznWcLKf67OWugLrpp+x3Y:JGlLEDAIznZKCoYwI

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\072dacdbb99949e8237decd36da652dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\072dacdbb99949e8237decd36da652dd_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3640
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:5076
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    PID:4724
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla
    1⤵
    • Loads dropped DLL
    PID:4900
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc
    1⤵
    • Loads dropped DLL
    PID:4560
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation
    1⤵
    • Loads dropped DLL
    PID:2648
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent
    1⤵
    • Loads dropped DLL
    PID:2852
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService
    1⤵
    • Loads dropped DLL
    PID:3536
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp
    1⤵
    • Loads dropped DLL
    PID:3696
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours
    1⤵
    • Loads dropped DLL
    PID:4456
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3820 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4528
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit
      1⤵
      • Loads dropped DLL
      PID:1548
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc
      1⤵
      • Loads dropped DLL
      PID:1080
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr
      1⤵
      • Loads dropped DLL
      PID:3296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

      Filesize

      105KB

      MD5

      0c9abb6a7ed55469c38113ad2e51dfa5

      SHA1

      4b113df33b8025312bf651eb85fe3ec17932f3f0

      SHA256

      5129869fa67caaf18e4124887f377d24de01b5b1b3862ccf9b0160ed8ef13aca

      SHA512

      d4c1c1098c20538e34c88884cb9577c2a42434ab8c5d6e54bb2de65a263c6b6f64c88c53c16638707c6e937c40e004142fbcbcd11c6c63f3e2437bdbb9c66736

    • memory/3640-0-0x00000000005F0000-0x000000000060C000-memory.dmp

      Filesize

      112KB

    • memory/3640-41-0x00000000005F0000-0x000000000060C000-memory.dmp

      Filesize

      112KB

    • memory/4724-9-0x0000000075AC0000-0x0000000075ADC000-memory.dmp

      Filesize

      112KB

    • memory/4900-13-0x0000000075AC0000-0x0000000075ADC000-memory.dmp

      Filesize

      112KB

    • memory/5076-5-0x0000000075AC0000-0x0000000075ADC000-memory.dmp

      Filesize

      112KB