Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 19:58
Behavioral task
behavioral1
Sample
8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe
-
Size
34KB
-
MD5
8bc0f4d4d6744642206459a53018c441
-
SHA1
5068eb8871cadbda74e5e0e22c3beadf7b46996e
-
SHA256
37de2a9e2c02244baa5a160449d69e10ad9424adc7035aaaa586942d72ddc00d
-
SHA512
a725555358f3520b28d24eb4da41d781a601734f0d9eca0a5f0d8f65844578b091c25f35b43f5724f09dff0c0a53d56601123308e81d593d00a735df3f8b7842
-
SSDEEP
768:ox7V4Q/xPao6O97cb9eOKguVWAmromN8Kz/p:o9Vpao659HruVWAmMmN82/p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 rundll32.exe -
resource yara_rule behavioral2/memory/2588-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2588-28-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumidimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\yuksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp8.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\SogouExplorer\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\SogouExplorer\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\SogouExplorer\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\midimap.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\360\360se3\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\ksuser.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe File created C:\Program Files\Internet Explorer\msimg32.dll 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4388 sc.exe 3008 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1752 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 91 PID 2588 wrote to memory of 1752 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 91 PID 2588 wrote to memory of 1752 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 91 PID 2588 wrote to memory of 4388 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 92 PID 2588 wrote to memory of 4388 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 92 PID 2588 wrote to memory of 4388 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 92 PID 2588 wrote to memory of 3008 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 93 PID 2588 wrote to memory of 3008 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 93 PID 2588 wrote to memory of 3008 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 93 PID 2588 wrote to memory of 2284 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 96 PID 2588 wrote to memory of 2284 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 96 PID 2588 wrote to memory of 2284 2588 8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe 96 PID 1752 wrote to memory of 3844 1752 net.exe 98 PID 1752 wrote to memory of 3844 1752 net.exe 98 PID 1752 wrote to memory of 3844 1752 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8bc0f4d4d6744642206459a53018c441_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:3844
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1723406287.dat, ServerMain c:\users\admin\appdata\local\temp\8bc0f4d4d6744642206459a53018c441_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4060,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:3796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD55f2f0e0b0a157b5912f9801284459589
SHA1492024bdca9c9765a64d09902c5f088315c7305f
SHA256cc8f256098cb52a3ba184dbded59bd6a4885d1ac9c4a404e0a7184b8fed07ef8
SHA512aa6101e9341663cb4e8096fc55e6c6c04b6ee341ad2320b0bd1ee1adc4ab2da31173cab706bb487fbf14cfa24b95a273257e6aad43d684cb2dd4cc1703ff51ae