Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 05:57

General

  • Target

    8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    8347341fccc8735768ccc1a22e935272

  • SHA1

    0dec90c8aa582df03eac63cb0cc4f8fd8f559853

  • SHA256

    df6588fac47aa123a2e753927de36e802cb0a40e3771a1109d5748c2437ce275

  • SHA512

    22fd0639fb787748b0f33b460b9de444e6c9a93d2616fecca58a0dbd184cbc7fd3fd5a6834c0c4bc58704079c7d7a27a697562ce8027045e434fd9c113ca72da

  • SSDEEP

    1536:lneLFVzsAv8CTsU9Q2ApqAU0nD9DSDBSncy7UBAvRjfppopYMDWnm+eNi:0RZsAvA6pAp+0nDZSEFUBoRjUpYpleNi

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 24 IoCs
  • Drops file in System32 directory 14 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2524
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2356
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2716
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2496
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2796
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2668
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2628
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3004
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2980
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2896
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1192
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2516
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2108
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

          Filesize

          87KB

          MD5

          a708b3eb0f5b369c9fb08de599805b1c

          SHA1

          b8642657759bf32420c359df4412494835a35b09

          SHA256

          888eaf09b4a7846f6d8b337024a083819738cd95e1fe31654e987bbc0f1b8107

          SHA512

          a065fd0abf903602c7827248daf1b444878c0efab61f8bd8600ef8e466d544e4808511b2b9bdcb7e18ba56487cdfef8708dc2958637f1db08c8a8158d7255de9

        • memory/1192-55-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB

        • memory/1192-56-0x0000000074CD0000-0x0000000074CF2000-memory.dmp

          Filesize

          136KB

        • memory/2108-66-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB

        • memory/2516-61-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB

        • memory/2524-15-0x00000000009E0000-0x0000000000A02000-memory.dmp

          Filesize

          136KB

        • memory/2524-0-0x00000000009E0000-0x0000000000A02000-memory.dmp

          Filesize

          136KB

        • memory/2524-25-0x0000000000180000-0x00000000001A2000-memory.dmp

          Filesize

          136KB

        • memory/2524-24-0x0000000000180000-0x00000000001A2000-memory.dmp

          Filesize

          136KB

        • memory/2524-3-0x0000000000A01000-0x0000000000A02000-memory.dmp

          Filesize

          4KB

        • memory/2524-2-0x0000000000180000-0x00000000001A2000-memory.dmp

          Filesize

          136KB

        • memory/2628-37-0x0000000074CD0000-0x0000000074CF2000-memory.dmp

          Filesize

          136KB

        • memory/2628-36-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB

        • memory/2668-30-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB

        • memory/2716-13-0x00000000747B0000-0x00000000747D2000-memory.dmp

          Filesize

          136KB

        • memory/2716-14-0x0000000074780000-0x00000000747A2000-memory.dmp

          Filesize

          136KB

        • memory/3004-43-0x0000000074CD0000-0x0000000074CF2000-memory.dmp

          Filesize

          136KB

        • memory/3004-42-0x0000000074D00000-0x0000000074D22000-memory.dmp

          Filesize

          136KB