Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe
-
Size
660KB
-
MD5
7830bab89c6a95ef26d95a7ead4bea32
-
SHA1
45d59fee7bd4afb6a1de8e098f4335241dcdc990
-
SHA256
5b8e888ccbf49eb6f3413fde030c118dc3ac90b9349baa9e34533d628808188b
-
SHA512
a93466b1c98aa1ba5b611bca47ed8b96a7555ce2b7c3bbd37a93e03791c126cb85708ff233be532da09ffbb47a0524cdfa90c3a6fab1c838e852a349bedfcefa
-
SSDEEP
12288:EUuymnNMr1yQCgKSFR97yehh8Jhb2vSJXKW2LAMBUij9uMsq5itl:qZKr18gZjj70bQaXKW4xjrP2l
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360safe\Parameters\ServiceDll = "C:\\Windows\\system32\\Sp.dll" 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2268 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe 2036 svchost.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sp.dll 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2268 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2268 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2268 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2268 1900 7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32 PID 2036 wrote to memory of 2176 2036 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\7830BA~1.EXE" > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "360safe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\sp.dll, Launch2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD50b92e2f0ac593e30cd921f5d2e54ad04
SHA13e71561bb1e8057eba21752cb10e40aca54f1e4d
SHA256d239cf1435b4063a671bbc121033333a20ab78f1e09226c1f2591bc76a2827f0
SHA5125ae85ad83e3159d7b62529a0bc855ca5c77218cded669a859798691b3c01968ab0b311f6d2669326d37ff0d48e102f04f0997844a3401f04c1ae90cf62aeeabf