Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
4535570af096c67d458fb4413f103095_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4535570af096c67d458fb4413f103095_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4535570af096c67d458fb4413f103095_JaffaCakes118.exe
-
Size
214KB
-
MD5
4535570af096c67d458fb4413f103095
-
SHA1
3d03f4a8569f5b9ff42c1a3ad8ab39643e4ca2ca
-
SHA256
0be7313f8e2fc4b38bcfee4e90eaf711d5be54545e9eca51093d3cf111257da5
-
SHA512
f7b73cd81bbf6269180967d6d67907e3e17569715da77ceb117e66830f264f56325b35b8798bfeda1ab775af98c04b6de08f9961af6f035f033930ae475dfff6
-
SSDEEP
6144:OZ7a9ytXnyTZgB4jbJbD4JDTXT/THjPWIal:OZjwIIbJbMB3Hj+Ia
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BRC_Services\Parameters\ServiceDll = "C:\\Windows\\system32\\brc_Server.dll" 4535570af096c67d458fb4413f103095_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 svchost.exe 2668 svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\brc_Server.dll 4535570af096c67d458fb4413f103095_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\brc_Server.dat 4535570af096c67d458fb4413f103095_JaffaCakes118.exe File created C:\Windows\SysWOW64\brc_Server.dat 4535570af096c67d458fb4413f103095_JaffaCakes118.exe File created C:\Windows\SysWOW64\brc_Server.exe 4535570af096c67d458fb4413f103095_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\brc_Server.exe 4535570af096c67d458fb4413f103095_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe 1332 4535570af096c67d458fb4413f103095_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4535570af096c67d458fb4413f103095_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4535570af096c67d458fb4413f103095_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD50fdfa34fc2a78c6ef60d66b68ac6be8a
SHA1715b05b198ec520c800aec602021e1024c1d0949
SHA2567b02d6590783ccc84717a0817b7744f1e996b3b6a17fda5cd1207593cf846ef6
SHA5120752c1a0b7d85e41175f4ef6438d6274b2c573ae6b2c15769f4dba4ca0ab476506871d23ac2142e225023f0836a80998253e732aa1e18a9810ac708becf8798a
-
Filesize
331KB
MD550082b8a2b6182cf467005de30db913e
SHA188911691f3f36d22af3c3b99eb66f539ce377049
SHA2568d69a82476384544aeb8ef907e73d5ec006668c0a9f96c8bc28ef2be18f2acd7
SHA512aca46ba65e79623392e8b9f673932c625a132a055be6c957fa4d61613d01e485f945d7364ddfc87bc609e7379cc85a8bd4eae0775e2cb9d161a4f35c8471bb7f