Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 00:13
Behavioral task
behavioral1
Sample
ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe
-
Size
380KB
-
MD5
ad284fee3b96420b850ad30abefaf485
-
SHA1
6f985368d612179e8da613bbe5caf19a3b00d2c2
-
SHA256
441c8a241df631d69b709976ffa30b5d0b2affb4b1e7a2473800ac91ad9b542e
-
SHA512
b8b8ee0bf471b6609507f3f5a4941c1ba15aa704bee48779232c07387896bb804bd65c21866c3385e22a9db9e2af1edb1cd1c05e7393052967981434653de775
-
SSDEEP
6144:ksd2D6wsraBCDorABJclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:ksd2JsraBbbDvJAmTs9C+hGaCk
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 242760c1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 242760c1.exe -
resource yara_rule behavioral1/files/0x000700000001211b-6.dat aspack_v212_v242 behavioral1/files/0x00080000000173de-15.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2052 242760c1.exe -
Loads dropped DLL 12 IoCs
pid Process 2540 svchost.exe 1876 svchost.exe 2820 svchost.exe 2624 svchost.exe 2300 svchost.exe 1808 svchost.exe 844 svchost.exe 2804 svchost.exe 2564 svchost.exe 1140 svchost.exe 376 svchost.exe 2584 svchost.exe -
resource yara_rule behavioral1/memory/3004-0-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/files/0x000700000001211b-6.dat upx behavioral1/memory/2052-8-0x00000000010A0000-0x00000000010ED000-memory.dmp upx behavioral1/memory/2052-11-0x00000000010A0000-0x00000000010ED000-memory.dmp upx behavioral1/memory/2052-10-0x00000000010A0000-0x00000000010ED000-memory.dmp upx behavioral1/memory/2540-17-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2540-18-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2540-16-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/files/0x00080000000173de-15.dat upx behavioral1/memory/2540-20-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/3004-22-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/1876-28-0x0000000074B40000-0x0000000074B8D000-memory.dmp upx behavioral1/memory/1876-27-0x0000000074B40000-0x0000000074B8D000-memory.dmp upx behavioral1/memory/1876-26-0x0000000074B40000-0x0000000074B8D000-memory.dmp upx behavioral1/memory/2052-32-0x00000000010A0000-0x00000000010ED000-memory.dmp upx behavioral1/memory/2820-36-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2820-40-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2820-38-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2820-37-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2624-44-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2624-45-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2624-48-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2624-46-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2300-53-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2300-52-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/2300-57-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/1808-62-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/1808-61-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/1808-64-0x0000000075090000-0x00000000750DD000-memory.dmp upx behavioral1/memory/3004-73-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/2804-79-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2804-80-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2804-78-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2804-82-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2564-87-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2564-91-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2564-89-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2564-88-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/1140-97-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/1140-96-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/1140-95-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/376-102-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/376-103-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/376-104-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/376-106-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2584-112-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2584-113-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2584-111-0x0000000075610000-0x000000007565D000-memory.dmp upx behavioral1/memory/2584-115-0x0000000075610000-0x000000007565D000-memory.dmp upx -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Wmi.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 242760c1.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 242760c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 242760c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2052 242760c1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2052 3004 ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\242760c1.exeC:\242760c1.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2540
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1876
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2820
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2624
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1808
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- System Location Discovery: System Language Discovery
PID:1364
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2804
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1140
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:376
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD52f85e77cf24aeccc9b45fbb8111e8281
SHA1733527ebc2cd96d8959687f82981ee53edba06be
SHA25691d4ded63ae059c700b3f914fa8f3d801f64de851541ef3c8b94092bba9a5049
SHA5124ccfaea2354e1d8058585ee56f886a6d337c297443a92a8e016c0978984b0690b73386b220dd82f29f8446d05160ed30f06d35f75914f5608296a31ae35e4378
-
Filesize
237KB
MD59998f3c081fe4f1868a46f19ba376b45
SHA1cc945a970dd893abeb80996ea748eeec907db5ae
SHA2562793e4b88b0c946f4874e2feb0b2cbf0b8c48627b867f12efdcb4697993476be
SHA51207d5249eccf7b27c3c0e980fcb27d6397e4c50a17d0cd02bf663b263b56858a51ba39068b649b6354bba130c27fa881ef8adc95b42e242f0a6afe6388d363f22