Analysis

  • max time kernel
    146s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 12:14

General

  • Target

    7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    7830bab89c6a95ef26d95a7ead4bea32

  • SHA1

    45d59fee7bd4afb6a1de8e098f4335241dcdc990

  • SHA256

    5b8e888ccbf49eb6f3413fde030c118dc3ac90b9349baa9e34533d628808188b

  • SHA512

    a93466b1c98aa1ba5b611bca47ed8b96a7555ce2b7c3bbd37a93e03791c126cb85708ff233be532da09ffbb47a0524cdfa90c3a6fab1c838e852a349bedfcefa

  • SSDEEP

    12288:EUuymnNMr1yQCgKSFR97yehh8Jhb2vSJXKW2LAMBUij9uMsq5itl:qZKr18gZjj70bQaXKW4xjrP2l

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7830bab89c6a95ef26d95a7ead4bea32_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\7830BA~1.EXE" > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3360
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "360safe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\sp.dll, Launch
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Sp.dll

          Filesize

          526KB

          MD5

          0b92e2f0ac593e30cd921f5d2e54ad04

          SHA1

          3e71561bb1e8057eba21752cb10e40aca54f1e4d

          SHA256

          d239cf1435b4063a671bbc121033333a20ab78f1e09226c1f2591bc76a2827f0

          SHA512

          5ae85ad83e3159d7b62529a0bc855ca5c77218cded669a859798691b3c01968ab0b311f6d2669326d37ff0d48e102f04f0997844a3401f04c1ae90cf62aeeabf

        • memory/1040-0-0x00000000001B0000-0x000000000025A000-memory.dmp

          Filesize

          680KB

        • memory/1040-3-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/1040-6-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/1040-17-0x00000000001B0000-0x000000000025A000-memory.dmp

          Filesize

          680KB

        • memory/2056-16-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/2056-19-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/3120-11-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/3120-12-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB

        • memory/3120-18-0x0000000075910000-0x0000000075AEA000-memory.dmp

          Filesize

          1.9MB