Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe
-
Size
79KB
-
MD5
81c99e9f40b36b9f8201bf47b974b087
-
SHA1
8454764e151bf8622541abd7f608e69dea701e30
-
SHA256
29d9112141942b8d398e4a8013061e409af130412b3f886ae5a42d12d6526738
-
SHA512
af1c1b61395f455b07d95bef1b308af9fc6e3266fc720fd0eea02220165b4304f81ade119badd3ff77e48710d0bb421fcd26801ec0090fc599e34c8c9432d1f8
-
SSDEEP
1536:vbJUWIcJuPQWr5B/lAMG83RheVPGSFPT:jSWIpr5BnhIFF7
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 2580 Rundll32.exe 2580 Rundll32.exe 2580 Rundll32.exe 2580 Rundll32.exe 436 Rundll32.exe 436 Rundll32.exe 436 Rundll32.exe 436 Rundll32.exe 436 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\seat.dll 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe File created C:\Windows\SysWOW64\miat.dll 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1904 sc.exe 2292 sc.exe 2100 sc.exe 2136 sc.exe 2652 sc.exe 2040 sc.exe 1908 sc.exe 3032 sc.exe 2752 sc.exe 2644 sc.exe 2884 sc.exe 1872 sc.exe 2056 sc.exe 2212 sc.exe 2708 sc.exe 2184 sc.exe 2248 sc.exe 2896 sc.exe 1920 sc.exe 2628 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2580 Rundll32.exe 2580 Rundll32.exe 2580 Rundll32.exe 2580 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 300 wrote to memory of 2580 300 81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe 30 PID 2580 wrote to memory of 2040 2580 Rundll32.exe 31 PID 2580 wrote to memory of 2040 2580 Rundll32.exe 31 PID 2580 wrote to memory of 2040 2580 Rundll32.exe 31 PID 2580 wrote to memory of 2040 2580 Rundll32.exe 31 PID 2580 wrote to memory of 1904 2580 Rundll32.exe 32 PID 2580 wrote to memory of 1904 2580 Rundll32.exe 32 PID 2580 wrote to memory of 1904 2580 Rundll32.exe 32 PID 2580 wrote to memory of 1904 2580 Rundll32.exe 32 PID 2580 wrote to memory of 1908 2580 Rundll32.exe 33 PID 2580 wrote to memory of 1908 2580 Rundll32.exe 33 PID 2580 wrote to memory of 1908 2580 Rundll32.exe 33 PID 2580 wrote to memory of 1908 2580 Rundll32.exe 33 PID 2580 wrote to memory of 2292 2580 Rundll32.exe 35 PID 2580 wrote to memory of 2292 2580 Rundll32.exe 35 PID 2580 wrote to memory of 2292 2580 Rundll32.exe 35 PID 2580 wrote to memory of 2292 2580 Rundll32.exe 35 PID 2580 wrote to memory of 2100 2580 Rundll32.exe 37 PID 2580 wrote to memory of 2100 2580 Rundll32.exe 37 PID 2580 wrote to memory of 2100 2580 Rundll32.exe 37 PID 2580 wrote to memory of 2100 2580 Rundll32.exe 37 PID 2580 wrote to memory of 1872 2580 Rundll32.exe 38 PID 2580 wrote to memory of 1872 2580 Rundll32.exe 38 PID 2580 wrote to memory of 1872 2580 Rundll32.exe 38 PID 2580 wrote to memory of 1872 2580 Rundll32.exe 38 PID 2580 wrote to memory of 2056 2580 Rundll32.exe 39 PID 2580 wrote to memory of 2056 2580 Rundll32.exe 39 PID 2580 wrote to memory of 2056 2580 Rundll32.exe 39 PID 2580 wrote to memory of 2056 2580 Rundll32.exe 39 PID 2580 wrote to memory of 2212 2580 Rundll32.exe 40 PID 2580 wrote to memory of 2212 2580 Rundll32.exe 40 PID 2580 wrote to memory of 2212 2580 Rundll32.exe 40 PID 2580 wrote to memory of 2212 2580 Rundll32.exe 40 PID 2580 wrote to memory of 2708 2580 Rundll32.exe 42 PID 2580 wrote to memory of 2708 2580 Rundll32.exe 42 PID 2580 wrote to memory of 2708 2580 Rundll32.exe 42 PID 2580 wrote to memory of 2708 2580 Rundll32.exe 42 PID 2580 wrote to memory of 3032 2580 Rundll32.exe 44 PID 2580 wrote to memory of 3032 2580 Rundll32.exe 44 PID 2580 wrote to memory of 3032 2580 Rundll32.exe 44 PID 2580 wrote to memory of 3032 2580 Rundll32.exe 44 PID 2580 wrote to memory of 1920 2580 Rundll32.exe 47 PID 2580 wrote to memory of 1920 2580 Rundll32.exe 47 PID 2580 wrote to memory of 1920 2580 Rundll32.exe 47 PID 2580 wrote to memory of 1920 2580 Rundll32.exe 47 PID 2580 wrote to memory of 2184 2580 Rundll32.exe 48 PID 2580 wrote to memory of 2184 2580 Rundll32.exe 48 PID 2580 wrote to memory of 2184 2580 Rundll32.exe 48 PID 2580 wrote to memory of 2184 2580 Rundll32.exe 48 PID 2580 wrote to memory of 2248 2580 Rundll32.exe 49 PID 2580 wrote to memory of 2248 2580 Rundll32.exe 49 PID 2580 wrote to memory of 2248 2580 Rundll32.exe 49 PID 2580 wrote to memory of 2248 2580 Rundll32.exe 49 PID 2580 wrote to memory of 2136 2580 Rundll32.exe 51 PID 2580 wrote to memory of 2136 2580 Rundll32.exe 51 PID 2580 wrote to memory of 2136 2580 Rundll32.exe 51 PID 2580 wrote to memory of 2136 2580 Rundll32.exe 51 PID 2580 wrote to memory of 2628 2580 Rundll32.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c99e9f40b36b9f8201bf47b974b087_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\seat.dll Execute2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\sc.exesc stop RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\sc.exesc stop McNASvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\sc.exesc delete McNASvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\sc.exesc stop MpfService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\sc.exesc delete MpfService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\sc.exesc stop McProxy3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\sc.exesc delete McProxy3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\sc.exesc stop McShield3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\sc.exesc delete McShield3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\sc.exesc stop McODS3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\sc.exesc delete McODS3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\sc.exesc stop mcmscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\sc.exesc delete mcmscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\sc.exesc stop McSysmon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\sc.exesc delete McSysmon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\sc.exesc stop ekrn3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\sc.exesc delete ekrn3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\miat.dll Execute2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55c06d52d07a39f36e04a05e5b565dbc2
SHA133daaf8afc98426f22da0395eb3b4da7d60f383b
SHA2568373917a90395c6f6d88480939cbf3e5875caab93750e2b4520665b90f305d26
SHA512030eeb0b90f2cf099251a7bab6a3ede3cb577710a1580464c18f089021f82a16386d8eba20634fa1cfacb9424c9b1a228f1189b7b85bed08ffc1c52b22c04156
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
Filesize
8KB
MD55fd366e1f6dd7500fc0bfad1cd50c880
SHA1faa0988a9c1a05145d9ab7325bdefb95e142b80c
SHA25613be6c2e89c054911f42c8221dd85ee87f08b85588b55ae0879eb47a3d8664a4
SHA512abf7f9db81c32d68ae4a6304f5992d9af7a4f0448b44d1f6fb90e9e08e41ba38ee7769f2125a21d1891a3c3e7ad57da96ebd00d727488b9f76758aa13559bd1b
-
Filesize
14KB
MD596db3b9aec3b3695fa13cbd594982ecf
SHA1de05cc22d8393d08dfd9f1ee73cc3dba9733f748
SHA2568e6fa1336ff0bd77e2e766e556a999dbcaa707469820879b0f5b0dfe9d7061dc
SHA512b4e1cd02128c5e3d767b169b0d39e1682d7932eb5201c0e76750d6caad6869f8b6489101f08e9254444ac16f7f4f75f670dc07eb331a5758576edf19aff92c95