Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe
-
Size
45KB
-
MD5
0e02d46186e444b4b02658f3c1ff48a6
-
SHA1
25d690e044a77af7de92940a03db8bae56fb5113
-
SHA256
c553c0e55490065eff5e6162f4fb417fc8d09bd89e1acbe96b23c433610d8533
-
SHA512
30a3dd2b71eec84c69fc4c2fa310709fcf52e2f7bc20ab4c1f519eae25bcb3f6f8aa938cdb6b570a75fabbabc9d10915096bf7073b21b818e355cfd3fbf002a6
-
SSDEEP
768:DsZ9WBMb0j7emhk1Ma3XiK69Y5mVvPhoHCesGL3YHE1hAfrsLSu3yB:Ds6zeN15ns9GAHbHy3YHtfxuiB
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\UPS.sys 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe -
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\UPS\Parameters\ServiceDll = "%SystemRoot%\\System32\\UPS.dll" 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\UPS\Parameters\ServiceDll = "%SystemRoot%\\System32\\UPS.dll" 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\UPS\Parameters\ServiceDll = "%SystemRoot%\\System32\\UPS.dll" 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2068 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe 2068 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\UPS.dll 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SoftWareProtector\muma_out.pr 0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e02d46186e444b4b02658f3c1ff48a6_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:3028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k UPS1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5060db55aa36eef9615404e1dde310198
SHA1fc98279f45611c65a28fd12dc84b39d6b1a7e804
SHA25671d54d05f2a198cb60b9e11fc2d252449d064fc80e32128265b42d4bb53aef41
SHA512ea91417a32d9f32fd658451248c2679578bbedf83205000706b073f45b81051399a58daffe6b219dcd32af0e5ee3258813fb0cb5621925f59145354589ded605