Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 15:51

General

  • Target

    31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe

  • Size

    80KB

  • MD5

    31001c0b3294f2c79e837b414f1a2692

  • SHA1

    aecc35b151ae805431133ef465537ba05d27a807

  • SHA256

    ee8a64bd6a4006e9b567635a4f3bf1bc5f4dbd17db09167a20741965c3a2e01e

  • SHA512

    e60559a3525e4631ed735ab401b554da5910ca29fcaa203cb84837cdc38e64eb1352687eb586f10ee2f9b67c97642993f65863e7fd1c8aabc3e296c9bfe31bc4

  • SSDEEP

    1536:vvz1Q27x4i3zY/Zv5BlEStr91keFQFxyYj9mPppocy:vvx7G+zoZvNEkrOxyYj9BP

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 36 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\31001c0b3294f2c79e837b414f1a2692_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3632
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:3536
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    PID:1828
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla
    1⤵
    • Loads dropped DLL
    PID:764
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc
    1⤵
    • Loads dropped DLL
    PID:4560
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation
    1⤵
    • Loads dropped DLL
    PID:3528
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent
    1⤵
    • Loads dropped DLL
    PID:4988
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService
    1⤵
    • Loads dropped DLL
    PID:984
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp
    1⤵
    • Loads dropped DLL
    PID:1740
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours
    1⤵
    • Loads dropped DLL
    PID:460
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit
    1⤵
    • Loads dropped DLL
    PID:1256
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc
    1⤵
    • Loads dropped DLL
    PID:4916
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr
    1⤵
    • Loads dropped DLL
    PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    80KB

    MD5

    8e0ec0e8732cc36927f1f3efb2e941b6

    SHA1

    eed568c9b9a491109de09cd58ea257186b5a3d47

    SHA256

    b5e81fd07e16c2032ed8ba259d90ffa6d5ec4e4de792a1f38bd7b1abcdbb52e5

    SHA512

    1cdb57549afcd0890e9622f5b29694f7c7ac11ca902c980ad9375d46b77216ef080c338bb5f91dcc4e121aadc50bb23d3a7bd570d318be091f3fa188600b8c37

  • memory/460-68-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/460-69-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/764-20-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1256-76-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1256-77-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1256-73-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1740-61-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1740-60-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1828-15-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/1828-14-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3528-37-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3528-40-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3528-38-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3536-7-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3536-32-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3536-9-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3536-8-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/3632-23-0x00000000006E0000-0x0000000000700000-memory.dmp

    Filesize

    128KB

  • memory/3632-0-0x00000000006E0000-0x0000000000700000-memory.dmp

    Filesize

    128KB

  • memory/4560-31-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4560-28-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4560-30-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4772-90-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4772-92-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4916-82-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4988-47-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4988-49-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB

  • memory/4988-48-0x0000000075550000-0x0000000075570000-memory.dmp

    Filesize

    128KB