Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe
-
Size
104KB
-
MD5
87f29f7d9a8a5b075d1297c2cd162199
-
SHA1
7bf4b2d5ea9e2471849cd27a6a8aa0594f52830c
-
SHA256
2299f0bf6c75bd0d28d907fb62ae85eda9882e36c4e63f9b4516ae0aa29764fa
-
SHA512
f723daa87955398dfab8f7b5bd352d6485bb9ae73d8c7a9c46b855f4cf19c2735f361de789eb88d5f942aabd26aa5767a77a9c14b5f2be775a1f5a633b0df6a3
-
SSDEEP
3072:SONYVyEYHjWDj0xK9rlWtLysmVwo1BHq3K3clI2:SONYVUAjfWtLexHq3KY
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wowsystemcode123\Parameters\ServiceDll = "C:\\Windows\\system32\\wow65_542.dll" 87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4768 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 4768 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wow65_542.dll 87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\syscheck 87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87f29f7d9a8a5b075d1297c2cd162199_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a43809128f55f5b2956f3d48e5cea5ab
SHA1054717b738af16b6a57760bb3050440bc30e4988
SHA256f2ce503865a212728f3619b4e6eea291124df53076a7ad6abc7b42c47e88b59c
SHA51234287ca2f19937198a37fe98fb74bfe64d56de8faf8d0a74154003d45a5da3700692ce7e53bc841e27f5d790fe0431c591724cc8e0a09f2bb6619bc43639bc81