Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 19:23

General

  • Target

    4b1181b44748a0edc5b4d95916382848_JaffaCakes118.exe

  • Size

    139KB

  • MD5

    4b1181b44748a0edc5b4d95916382848

  • SHA1

    a1d68f8417ea6440acf82a6c5664bcad56b1d509

  • SHA256

    5853e4f131de097285728bb2ac0f3a7e2e3b457a98aa528980cd3b05d98e2d95

  • SHA512

    8a8f8465691d68df0464e895ca4a2f0719d9479a87bfd373898c369442dd0493422f98b0a02910fd092ec75a937eb62d4af45b03d9af4fd6cec88c2986ba0aee

  • SSDEEP

    3072:zH+Mcv5JXXieDEvy1W7rkD+bnAIhRjaNn:zHl0ndEqgkCAaRG9

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 42 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b1181b44748a0edc5b4d95916382848_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4b1181b44748a0edc5b4d95916382848_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1820
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:1788
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    PID:1812
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla
    1⤵
    • Loads dropped DLL
    PID:228
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc
    1⤵
    • Loads dropped DLL
    PID:3484
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation
    1⤵
    • Loads dropped DLL
    PID:1512
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent
    1⤵
    • Loads dropped DLL
    PID:2096
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService
    1⤵
    • Loads dropped DLL
    PID:3324
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp
    1⤵
    • Loads dropped DLL
    PID:4848
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours
    1⤵
    • Loads dropped DLL
    PID:4936
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit
    1⤵
    • Loads dropped DLL
    PID:4064
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc
    1⤵
    • Loads dropped DLL
    PID:3668
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr
    1⤵
    • Loads dropped DLL
    PID:4088

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

          Filesize

          139KB

          MD5

          f166d8a6143593af01d49f05cc8e5fd3

          SHA1

          d9f8c362b6ea267640bfd2854f25918a6a1f24ab

          SHA256

          818481dcfe138b3b26eece234a0e87bb3ccc69944e0b23e4ca759a3011ee31d4

          SHA512

          3c69f1e1b1be0c5e31240b91c1fd9ef477a011c50ddc940d75d176916bac9ce94ef0c432cea164ea9f2ff6366dbb80dd869cb8c736da4673b2f0c8a1f17467d3

        • memory/1512-36-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1788-5-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1812-12-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1820-19-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1820-0-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/2096-48-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/2096-51-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/2096-50-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/2096-46-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/2096-49-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/2096-47-0x0000000000F00000-0x0000000000F23000-memory.dmp

          Filesize

          140KB

        • memory/3484-29-0x0000000000F20000-0x0000000000F43000-memory.dmp

          Filesize

          140KB

        • memory/3484-24-0x0000000000F20000-0x0000000000F43000-memory.dmp

          Filesize

          140KB

        • memory/3484-30-0x0000000000F20000-0x0000000000F43000-memory.dmp

          Filesize

          140KB

        • memory/3484-31-0x0000000000F20000-0x0000000000F43000-memory.dmp

          Filesize

          140KB