Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:58
Behavioral task
behavioral1
Sample
8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe
-
Size
34KB
-
MD5
8bc0f4d4d6744642206459a53018c441
-
SHA1
5068eb8871cadbda74e5e0e22c3beadf7b46996e
-
SHA256
37de2a9e2c02244baa5a160449d69e10ad9424adc7035aaaa586942d72ddc00d
-
SHA512
a725555358f3520b28d24eb4da41d781a601734f0d9eca0a5f0d8f65844578b091c25f35b43f5724f09dff0c0a53d56601123308e81d593d00a735df3f8b7842
-
SSDEEP
768:ox7V4Q/xPao6O97cb9eOKguVWAmromN8Kz/p:o9Vpao659HruVWAmMmN82/p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 rundll32.exe -
resource yara_rule behavioral1/memory/2200-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2200-24-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp8.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yuksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumidimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\SogouExplorer\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\SogouExplorer\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\SogouExplorer\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2308 sc.exe 2460 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1980 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 28 PID 2200 wrote to memory of 1980 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 28 PID 2200 wrote to memory of 1980 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 28 PID 2200 wrote to memory of 1980 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 28 PID 2200 wrote to memory of 2308 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 29 PID 2200 wrote to memory of 2308 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 29 PID 2200 wrote to memory of 2308 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 29 PID 2200 wrote to memory of 2308 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 29 PID 2200 wrote to memory of 2460 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2460 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2460 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2460 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 2200 wrote to memory of 2320 2200 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 32 PID 1980 wrote to memory of 1996 1980 net.exe 35 PID 1980 wrote to memory of 1996 1980 net.exe 35 PID 1980 wrote to memory of 1996 1980 net.exe 35 PID 1980 wrote to memory of 1996 1980 net.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2460
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1723406286.dat, ServerMain c:\users\admin\appdata\local\temp\8bc0f4d4d6744642206459a53018c441_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d74b32acf3c52769c8b6a110ebd59563
SHA1179dc3d1b5d32c030db6e46d3b183e2d64950a3a
SHA256eeda3bd5cac42425c06cf9e6fe9f63e25c2da57d125c30ce6fb5e462019103e0
SHA5126e86152d7e22bd87ab68b17687316aec7d3588503aad67927b95c7d9d08baee27e7f4865c142133758f07e792201e44bb81f3810b6c99d0138cd9666cd531c99