Analysis
-
max time kernel
147s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe
-
Size
71KB
-
MD5
9fe28443416a84b4bf6978d007dc0c74
-
SHA1
1d10dc0f72a4956e5283bf5dfcf75c974cdd04ea
-
SHA256
bb9cc5de409a0c547d90580cc5508f2b11a188530501274536334a393faa93ae
-
SHA512
3cb81b3b8f81a493b6a6d4b4418c8c68422068a4bb06f7aa4daeadefe258a5d1d3b1c6d01fedaf7d2df272f3693e415ed36048bec1e14738674e01ce79feec19
-
SSDEEP
1536:PDqiIm+Oi/W6S/bs9cjja9yZfgt1OiMIik0BjIz:PD+J/Y/NLfgt1R0BjIz
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\qmgr.dll" 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 920 set thread context of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4072 sc.exe 2480 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1476 3548 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3548 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 3548 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 920 wrote to memory of 3548 920 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 84 PID 3548 wrote to memory of 3228 3548 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 85 PID 3548 wrote to memory of 3228 3548 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 85 PID 3548 wrote to memory of 3228 3548 9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe 85 PID 3228 wrote to memory of 2788 3228 cmd.exe 87 PID 3228 wrote to memory of 2788 3228 cmd.exe 87 PID 3228 wrote to memory of 2788 3228 cmd.exe 87 PID 2788 wrote to memory of 1620 2788 net.exe 88 PID 2788 wrote to memory of 1620 2788 net.exe 88 PID 2788 wrote to memory of 1620 2788 net.exe 88 PID 3228 wrote to memory of 5076 3228 cmd.exe 89 PID 3228 wrote to memory of 5076 3228 cmd.exe 89 PID 3228 wrote to memory of 5076 3228 cmd.exe 89 PID 5076 wrote to memory of 4904 5076 net.exe 90 PID 5076 wrote to memory of 4904 5076 net.exe 90 PID 5076 wrote to memory of 4904 5076 net.exe 90 PID 3228 wrote to memory of 4072 3228 cmd.exe 94 PID 3228 wrote to memory of 4072 3228 cmd.exe 94 PID 3228 wrote to memory of 4072 3228 cmd.exe 94 PID 3228 wrote to memory of 2480 3228 cmd.exe 95 PID 3228 wrote to memory of 2480 3228 cmd.exe 95 PID 3228 wrote to memory of 2480 3228 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9fe28443416a84b4bf6978d007dc0c74_JaffaCakes118.exe2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
\??\c:\windows\SysWOW64\cmd.exec:\windows\system32\cmd.exe /c net stop bits&net stop cryptsvc&sc config cryptsvc start= disabled&sc delete cryptsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\net.exenet stop bits4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bits5⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
C:\Windows\SysWOW64\net.exenet stop cryptsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc5⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 3203⤵
- Program crash
PID:1476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3548 -ip 35481⤵PID:4584