Analysis
-
max time kernel
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe
-
Size
87KB
-
MD5
8347341fccc8735768ccc1a22e935272
-
SHA1
0dec90c8aa582df03eac63cb0cc4f8fd8f559853
-
SHA256
df6588fac47aa123a2e753927de36e802cb0a40e3771a1109d5748c2437ce275
-
SHA512
22fd0639fb787748b0f33b460b9de444e6c9a93d2616fecca58a0dbd184cbc7fd3fd5a6834c0c4bc58704079c7d7a27a697562ce8027045e434fd9c113ca72da
-
SSDEEP
1536:lneLFVzsAv8CTsU9Q2ApqAU0nD9DSDBSncy7UBAvRjfppopYMDWnm+eNi:0RZsAvA6pAp+0nDZSEFUBoRjUpYpleNi
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe -
Loads dropped DLL 36 IoCs
pid Process 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 3000 svchost.exe 3000 svchost.exe 3000 svchost.exe 4364 svchost.exe 4364 svchost.exe 4364 svchost.exe 4112 svchost.exe 4112 svchost.exe 4112 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3832 svchost.exe 3832 svchost.exe 3832 svchost.exe 3852 svchost.exe 3852 svchost.exe 3852 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 1596 svchost.exe 1596 svchost.exe 1596 svchost.exe 3228 svchost.exe 3228 svchost.exe 3228 svchost.exe 3148 svchost.exe 3148 svchost.exe 3148 svchost.exe 4740 svchost.exe 4740 svchost.exe 4740 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nla.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe 4460 8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8347341fccc8735768ccc1a22e935272_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4920
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3000
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4364
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4112
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3296
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3832
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3852
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3780
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1596
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3228
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3148
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5a708b3eb0f5b369c9fb08de599805b1c
SHA1b8642657759bf32420c359df4412494835a35b09
SHA256888eaf09b4a7846f6d8b337024a083819738cd95e1fe31654e987bbc0f1b8107
SHA512a065fd0abf903602c7827248daf1b444878c0efab61f8bd8600ef8e466d544e4808511b2b9bdcb7e18ba56487cdfef8708dc2958637f1db08c8a8158d7255de9