Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 04:06

General

  • Target

    76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe

  • Size

    131KB

  • MD5

    76fd7e85d784f634f255644c0665fb03

  • SHA1

    68256e4d4c38ce278626f45f9ce23efa6d9b5eb5

  • SHA256

    372e07ac0ba85e9efde692b967c7f12d49fb5ea502e93baa29196c35d2e41ea3

  • SHA512

    d1798c0f64b6188476c345ab34c9a4ed1c8bedb4dd78b9d8860e2cfffde434d5ebe2be757143250d0c94ab0a1e35cf420597c62aea90faa0e271edb9c3e6010a

  • SSDEEP

    3072:lvzFyms8JJVb5Ax6oDm2v1RF/9eHiabuOw3sCpJ+:lLuKJYHvvDFECa63se+

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:2120
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\System32\drivers\etc\sHINLDW2.dll

    Filesize

    79KB

    MD5

    7220e4762369a7f1484db84d4b56326e

    SHA1

    1a00f3c3b868a9dfdde8c7b7ffaa0f5923a523ef

    SHA256

    c9b3a3ac546f96bc5127b3d3b6330426313103a66731873a495981f22ecf2c0b

    SHA512

    b3aa96b3e352cf46de2a714471896391b536c2c73201e9b8ef74a619f78222c73bda29a7e57ab7f65a8fb5b3159c37793bd9437e03623444e8dbb4f782266077

  • memory/2120-3-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2120-8-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2376-7-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB