Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe
-
Size
428KB
-
MD5
5c942556fc2236f74e7881960c0495d2
-
SHA1
cbfcce2e916621d273350457309912ade4e94d7b
-
SHA256
50a2078e95128a5d98e7687ab1d2733ad3fb97bbe3d8cd42ae0715564e1fa2a0
-
SHA512
b58ae3c9d5e8a3f760535717ef0b8d5f011d0c063192b201a5e9bb7faf38ecd70540613cabbb975080a2a143a668c24eb942fc8d327be18ac726f405f557d404
-
SSDEEP
12288:ZqmpplpGoGL3etQoMiXM8gxf/Sj4ykzMDRxT:Z563ey8gZqj4y7L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe -
resource yara_rule behavioral1/files/0x0007000000019506-55.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2820 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2996 lncom.exe 2692 fservice.exe 2868 services.exe -
Loads dropped DLL 9 IoCs
pid Process 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 2996 lncom.exe 2996 lncom.exe 2868 services.exe 2868 services.exe 2692 fservice.exe 2404 DllHost.exe 2996 lncom.exe -
resource yara_rule behavioral1/files/0x000b000000012281-6.dat upx behavioral1/memory/2996-26-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2692-40-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-54-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2692-68-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2996-78-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-81-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-83-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-85-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-86-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-88-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-90-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-92-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-94-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-96-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-98-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-100-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-102-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-104-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-106-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2868-108-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\lncom.exe 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe lncom.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\lncom.exe.bat lncom.exe File created C:\Windows\SysWOW64\lncom_.jpg 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File opened for modification C:\Windows\SysWOW64\lncom_.jpg DllHost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe lncom.exe File opened for modification C:\Windows\system\sservice.exe lncom.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe 2868 services.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 services.exe 2868 services.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2996 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2996 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2996 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2996 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2820 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2820 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2820 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 33 PID 2488 wrote to memory of 2820 2488 5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2692 2996 lncom.exe 35 PID 2996 wrote to memory of 2692 2996 lncom.exe 35 PID 2996 wrote to memory of 2692 2996 lncom.exe 35 PID 2996 wrote to memory of 2692 2996 lncom.exe 35 PID 2692 wrote to memory of 2868 2692 fservice.exe 36 PID 2692 wrote to memory of 2868 2692 fservice.exe 36 PID 2692 wrote to memory of 2868 2692 fservice.exe 36 PID 2692 wrote to memory of 2868 2692 fservice.exe 36 PID 2868 wrote to memory of 2560 2868 services.exe 37 PID 2868 wrote to memory of 2560 2868 services.exe 37 PID 2868 wrote to memory of 2560 2868 services.exe 37 PID 2868 wrote to memory of 2560 2868 services.exe 37 PID 2868 wrote to memory of 2568 2868 services.exe 38 PID 2868 wrote to memory of 2568 2868 services.exe 38 PID 2868 wrote to memory of 2568 2868 services.exe 38 PID 2868 wrote to memory of 2568 2868 services.exe 38 PID 2560 wrote to memory of 2288 2560 NET.exe 41 PID 2560 wrote to memory of 2288 2560 NET.exe 41 PID 2560 wrote to memory of 2288 2560 NET.exe 41 PID 2560 wrote to memory of 2288 2560 NET.exe 41 PID 2568 wrote to memory of 916 2568 NET.exe 42 PID 2568 wrote to memory of 916 2568 NET.exe 42 PID 2568 wrote to memory of 916 2568 NET.exe 42 PID 2568 wrote to memory of 916 2568 NET.exe 42 PID 2996 wrote to memory of 2524 2996 lncom.exe 43 PID 2996 wrote to memory of 2524 2996 lncom.exe 43 PID 2996 wrote to memory of 2524 2996 lncom.exe 43 PID 2996 wrote to memory of 2524 2996 lncom.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c942556fc2236f74e7881960c0495d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵PID:2288
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵PID:916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SysWOW64\lncom.exe.bat3⤵PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5C9425~1.EXE.bat2⤵
- Deletes itself
PID:2820
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5affd4b7a38ac9aa9e3136214d1f1b300
SHA1609f90b3b0097fd1c57c41a297455ddb700939aa
SHA2569c6380ec4f8c797cc1652c40558919388ddaa185ed84b33e9961913b551d8739
SHA512ee5de4ef626739a6a168037f9e5de67fa954e1fbbd3024634968c8b22594b7b7bd708daeab35a513362e9bb01c297c22852b2f95ea480176eb7dd6bd12d4931a
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
81KB
MD5070cf6787aa56fbdaa1b2fd98708c34c
SHA1fb662cbd45033e03f65e0f278f44f4206a3c4293
SHA256e073f22bff5d22fdbf3665855d2f979d300c4e28421a7edf5d616dd92c71580f
SHA51293adca8cd47db7fd07d1bb0834c92ef0460d86975ee17276573223eb378d3cc7bc8324c0cd62c024664159b0320501d37bbc97d266a40ed2a51fb3e8e163ba52
-
Filesize
342KB
MD5dd747ad0fadb8049994dbf630daf1379
SHA1be5bab73a9de91910970a307a3415577f951c6e4
SHA2569244d387fe54d19ce577e075332b5b0c2a18bdfd71ea7842cd62f3591295a684
SHA51288a2c33b9266fdb3edf46f80ddeb0a1108bf65e619ac7c7001300a41e20d1e7070e6a173c54f17a5f91fa957b6ca012a78d6192660e8a1385bb7b327f74cd2a3
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066