Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 18:30
Behavioral task
behavioral1
Sample
943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe
-
Size
33KB
-
MD5
943f44f05dbafa74f0fdac335aa051ae
-
SHA1
4bfc2c356465fc6dae8fe21748c7ce8fd8e59f58
-
SHA256
f64a787928c9a1bb3523cdcf2f144137d133d02d2c748c013e49cc1875fed5c3
-
SHA512
bd477abe8bb92edab845a9b76d6601ddfa24d469c4bfb90af7d1009e35cde38514bdc06ebc61c652f8fd2ca9e48b5a7e580b5071e870f11570c039c91e062cee
-
SSDEEP
768:q+b6GCOvFgxj2pQs97O0sEA+JGY65eoGP+iDh0MWLSn:qdGCwAj2yWO0G7heoGP+Evn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2380 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 rundll32.exe -
resource yara_rule behavioral1/memory/2996-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2996-12-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\yuksuser.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumidimap.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp18.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2364 sc.exe 2376 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2080 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2080 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2080 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2080 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2364 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 31 PID 2996 wrote to memory of 2364 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 31 PID 2996 wrote to memory of 2364 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 31 PID 2996 wrote to memory of 2364 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 31 PID 2996 wrote to memory of 2376 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 32 PID 2996 wrote to memory of 2376 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 32 PID 2996 wrote to memory of 2376 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 32 PID 2996 wrote to memory of 2376 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 32 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2996 wrote to memory of 2380 2996 943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe 33 PID 2080 wrote to memory of 1652 2080 net.exe 37 PID 2080 wrote to memory of 1652 2080 net.exe 37 PID 2080 wrote to memory of 1652 2080 net.exe 37 PID 2080 wrote to memory of 1652 2080 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\943f44f05dbafa74f0fdac335aa051ae_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1723573849.dat, ServerMain c:\users\admin\appdata\local\temp\943f44f05dbafa74f0fdac335aa051ae_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD59a1dec4afcea2ba6cc6787291b4a3da8
SHA132174f9cd6c07938995f37852a5b873271d478db
SHA256534ad2fcc837e9e75492465b001d58a1ef3c485a88d77d463bd82032b966ade7
SHA512a5b191866f4ad2c97fef4e39312e4e76f85f043c6da1fcde2e429daf281ed2af766312f7078e8c958c415c989da06b0688d874166f93954170c871760fac7169