Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:31
Behavioral task
behavioral1
Sample
2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe
-
Size
32KB
-
MD5
2f4f9c95bd249637b5f00e5fcbcd059c
-
SHA1
b717d0867dce43acda74beb911c757b6c25180f3
-
SHA256
7f01801364767f0eb1f1416bec3e3e54ea17507131c97b2c6730fba33dc551c9
-
SHA512
50df805d7ef75e1c7c9de841cf63b3e15e1d2316d12dd1ab92d98af035b5600aef6a0f6bda093fba07785e8e32ee58ec262fdff5eee521d3581f46b2ef1f0b08
-
SSDEEP
768:sIKeabNShwUAze2GK3sF0rRAJyBEI8ZjH7M:lab46UAzf3sIRK/H7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 rundll32.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2064-12-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysapp44.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumidimap.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File created C:\Windows\SysWOW64\yuksuser.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2436 sc.exe 2428 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1816 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1816 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1816 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1816 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2428 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2428 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2428 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2428 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 31 PID 2064 wrote to memory of 2436 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2436 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2436 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2436 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 2064 wrote to memory of 2016 2064 2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe 34 PID 1816 wrote to memory of 2484 1816 net.exe 37 PID 1816 wrote to memory of 2484 1816 net.exe 37 PID 1816 wrote to memory of 2484 1816 net.exe 37 PID 1816 wrote to memory of 2484 1816 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f4f9c95bd249637b5f00e5fcbcd059c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:2484
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:2428
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1720520845.dat, ServerMain c:\users\admin\appdata\local\temp\2f4f9c95bd249637b5f00e5fcbcd059c_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5382528e2ad15af49754d8eb93ea0c58f
SHA1e56372a958b65baf085e374955daab33c7042811
SHA256d08d003602ee43328129d303266bb25c0c3bc8a12cec0127db3bf37b62f6616d
SHA512e3581a93e439a305e011191845ca19414bc61ef522502f393e0567ba64e24f09800649ed069f7d71d9b2397f659eceedca89d788c0b64fdfffc3a3d63fd0ac87