Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 19:22

General

  • Target

    8ba753e45133f4895aaa2d1989798e37_JaffaCakes118.exe

  • Size

    138KB

  • MD5

    8ba753e45133f4895aaa2d1989798e37

  • SHA1

    bb68a0578decbf5ff9ce4ba2dda7bcf97fb1c0d8

  • SHA256

    9e75d4a007088a84fe9d93ef6d96b2e7a56baf91b46eaa990dfe3beed4d986f3

  • SHA512

    d0f365d2be55d27ba66e588374e198dd3ff0db9349b7f93c2d6f731ee6fab9cede90da9804f7d49010770787085b71ef1453aeb75287f7746244bfcafee746d2

  • SSDEEP

    1536:F4Hbo2hEK8S3L5GtEW50n+Sv+UqdLiFmf+II4n954M9IYCsQrSt7tcWBQ:F47opK8Shjd+ndLiFsRI49zqY117tt

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ba753e45133f4895aaa2d1989798e37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ba753e45133f4895aaa2d1989798e37_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2360
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Infotmp.txt

    Filesize

    720B

    MD5

    a2beaefdad2e2f8d653991aaf816085a

    SHA1

    3d278964eba2d54894c2f656a065e90ddf264d24

    SHA256

    0b49821f54694d81afd3c697d1257747e027c924b734682907ef3d26fe091198

    SHA512

    d25f674829b904dfdf9f88ce021af680cd8bd3140c4d1a5ac0f6e495c7690bc3a9478931384e4b6a44a78f43abbb14bfefee97920535e694180162f4adec1b68

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    138KB

    MD5

    16daf783dfbd346aa675805bd1bfe040

    SHA1

    0be6cb502fe7e65dac944793b230300c45f096ea

    SHA256

    43211eaf611b2b01bcb3808997fa936bcd24bbd4cebea2c23933a965b7eddb72

    SHA512

    b5d661979146444075070a8914b3cdff5f6b55c833159e0552408c3f9ec4b82bba5f99ddd29680ddf963ab25d9f736e27b5791baef7f2079a8be3d4b4874f626

  • memory/1152-10-0x0000000074E40000-0x0000000074E66000-memory.dmp

    Filesize

    152KB

  • memory/1152-13-0x0000000074E40000-0x0000000074E66000-memory.dmp

    Filesize

    152KB

  • memory/2360-0-0x0000000000F70000-0x0000000000F96000-memory.dmp

    Filesize

    152KB

  • memory/2360-6-0x0000000076F2C000-0x0000000076F2D000-memory.dmp

    Filesize

    4KB

  • memory/2360-5-0x00000000774F2000-0x00000000774F3000-memory.dmp

    Filesize

    4KB

  • memory/2360-12-0x0000000000F70000-0x0000000000F96000-memory.dmp

    Filesize

    152KB