Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe
-
Size
216KB
-
MD5
81c62d55a6ba31c41d4d4afc53d3add2
-
SHA1
e14d48832fb77539ec8ac3095f95d20389a1111f
-
SHA256
70fd7bdd336a3af25779015e3abeef084cbc35d38e0ee3f80b665dea5e91066c
-
SHA512
42fcebee391bec94de0748c9ea8588a4ddc69e9e64b9edf9f3975da24f824dd46c9f02eca8a6048276a899cf86b72602e02e2e50182b2372ef5a138d8416b60a
-
SSDEEP
6144:aMz19xEBlWWNOMxh+Sxpxi/5sAd29A4Hawl7yL3Or:aWxEKu/+Sm5d29PHh7N
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" 81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 792 svchost.exe 3000 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll 81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\RCXE0CB.tmp 81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3420 81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe 3000 rundll32.exe 3000 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 3000 792 svchost.exe 87 PID 792 wrote to memory of 3000 792 svchost.exe 87 PID 792 wrote to memory of 3000 792 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c62d55a6ba31c41d4d4afc53d3add2_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3420
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\fastuserswitchingcompatibilityex.dll, xxxxxx2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3000
-