Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe
-
Size
137KB
-
MD5
71a28c1872cdb6dc3d053d2ef7b1bec6
-
SHA1
4624b5cf3e7eb5f5b8efd823540d03befb9ffc79
-
SHA256
81e45204194c769e0be4118b68c886230be022c7ac2683ef8d1125ce727141f6
-
SHA512
25e45970080d517f4d6077371ac0e34add6cada6852c7fb1d641da97d24ba0ce307a9076b38fce517395e753d077a0f2e4814eee2a5c9e5821d278879f5f1728
-
SSDEEP
3072:dpaXy/qijYId24Wug9d0r+lBem/3/J/rJqX:dpmy/qijYIYQgjE2Bem/PJ/rJqX
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\qmgr.dll" 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qmgr.dll 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2988 sc.exe 2760 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2968 wrote to memory of 484 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe 30 PID 2968 wrote to memory of 484 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe 30 PID 2968 wrote to memory of 484 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe 30 PID 2968 wrote to memory of 484 2968 71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe 30 PID 484 wrote to memory of 2156 484 cmd.exe 32 PID 484 wrote to memory of 2156 484 cmd.exe 32 PID 484 wrote to memory of 2156 484 cmd.exe 32 PID 484 wrote to memory of 2156 484 cmd.exe 32 PID 2156 wrote to memory of 2320 2156 net.exe 33 PID 2156 wrote to memory of 2320 2156 net.exe 33 PID 2156 wrote to memory of 2320 2156 net.exe 33 PID 2156 wrote to memory of 2320 2156 net.exe 33 PID 484 wrote to memory of 2524 484 cmd.exe 34 PID 484 wrote to memory of 2524 484 cmd.exe 34 PID 484 wrote to memory of 2524 484 cmd.exe 34 PID 484 wrote to memory of 2524 484 cmd.exe 34 PID 2524 wrote to memory of 2544 2524 net.exe 35 PID 2524 wrote to memory of 2544 2524 net.exe 35 PID 2524 wrote to memory of 2544 2524 net.exe 35 PID 2524 wrote to memory of 2544 2524 net.exe 35 PID 484 wrote to memory of 2988 484 cmd.exe 38 PID 484 wrote to memory of 2988 484 cmd.exe 38 PID 484 wrote to memory of 2988 484 cmd.exe 38 PID 484 wrote to memory of 2988 484 cmd.exe 38 PID 484 wrote to memory of 2760 484 cmd.exe 39 PID 484 wrote to memory of 2760 484 cmd.exe 39 PID 484 wrote to memory of 2760 484 cmd.exe 39 PID 484 wrote to memory of 2760 484 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71a28c1872cdb6dc3d053d2ef7b1bec6_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\windows\SysWOW64\cmd.exec:\windows\system32\cmd.exe /c net stop bits&net stop cryptsvc&sc config cryptsvc start= disabled&sc delete cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\net.exenet stop bits3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bits4⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
C:\Windows\SysWOW64\net.exenet stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc4⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD54eb8eb23047fb45f6d3eaf3fd46b13bc
SHA1e334ca8413bc5822b98d1a7f48d44a84af0158af
SHA25632c840c155a5fd2ebea7f3bdabc4ec7f8e7c9dbb327bf5233ee41168f81ccaa0
SHA5128f22b7a2e99022203f65260975f861b61ea432c988f157a97293a6d6d6b2059210a4f58383eb7439d1a2d7580360746b9e2020d1193961b4a5ce240ba26f35d1