Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe
-
Size
80KB
-
MD5
31001c0b3294f2c79e837b414f1a2692
-
SHA1
aecc35b151ae805431133ef465537ba05d27a807
-
SHA256
ee8a64bd6a4006e9b567635a4f3bf1bc5f4dbd17db09167a20741965c3a2e01e
-
SHA512
e60559a3525e4631ed735ab401b554da5910ca29fcaa203cb84837cdc38e64eb1352687eb586f10ee2f9b67c97642993f65863e7fd1c8aabc3e296c9bfe31bc4
-
SSDEEP
1536:vvz1Q27x4i3zY/Zv5BlEStr91keFQFxyYj9mPppocy:vvx7G+zoZvNEkrOxyYj9BP
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe -
Loads dropped DLL 36 IoCs
pid Process 3536 svchost.exe 3536 svchost.exe 3536 svchost.exe 1828 svchost.exe 1828 svchost.exe 1828 svchost.exe 764 svchost.exe 764 svchost.exe 764 svchost.exe 4560 svchost.exe 4560 svchost.exe 4560 svchost.exe 3528 svchost.exe 3528 svchost.exe 3528 svchost.exe 4988 svchost.exe 4988 svchost.exe 4988 svchost.exe 984 svchost.exe 984 svchost.exe 984 svchost.exe 1740 svchost.exe 1740 svchost.exe 1740 svchost.exe 460 svchost.exe 460 svchost.exe 460 svchost.exe 1256 svchost.exe 1256 svchost.exe 1256 svchost.exe 4916 svchost.exe 4916 svchost.exe 4916 svchost.exe 4772 svchost.exe 4772 svchost.exe 4772 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Irmon.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe 3632 31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:3536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:1828
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:764
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:4560
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:3528
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:4988
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:984
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:1740
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:460
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:1256
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:4916
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD58e0ec0e8732cc36927f1f3efb2e941b6
SHA1eed568c9b9a491109de09cd58ea257186b5a3d47
SHA256b5e81fd07e16c2032ed8ba259d90ffa6d5ec4e4de792a1f38bd7b1abcdbb52e5
SHA5121cdb57549afcd0890e9622f5b29694f7c7ac11ca902c980ad9375d46b77216ef080c338bb5f91dcc4e121aadc50bb23d3a7bd570d318be091f3fa188600b8c37