Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 00:09

General

  • Target

    b166662818fcf7d781f0c4cbfe2c405f_JaffaCakes118.exe

  • Size

    63KB

  • MD5

    b166662818fcf7d781f0c4cbfe2c405f

  • SHA1

    18ef60839856beb27c18fb78240b71aa80348065

  • SHA256

    ca09ebe815ff0b125110d3897738f20b810dc0ffa0a14a33b25d454a935d386b

  • SHA512

    172977a127ab1929db94580a999e2cd86984b7b36742092128fce9b765df343d86c15ef10bbd3086daa4b254e5c3f1d8f91b1da576828dd93f3fcb7445d60355

  • SSDEEP

    1536:vRX4+xYuwuL/kTcoS9gQrAHVQZZ0BdfvDyYWa85:vR4eBLsTcD9FZ0jXDyYe5

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b166662818fcf7d781f0c4cbfe2c405f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b166662818fcf7d781f0c4cbfe2c405f_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 560
      2⤵
      • Program crash
      PID:3340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 556
      2⤵
      • Program crash
      PID:3448
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k MPSVCSERVER
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 4744
    1⤵
      PID:2532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4744 -ip 4744
      1⤵
        PID:4628

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\wtijgd.dll

              Filesize

              89KB

              MD5

              1b520c3a6999fb288bcd38e052d1dca8

              SHA1

              64203424ee4b566d82d4adcafe6c157c7f61ac21

              SHA256

              c4b87619338afcd962cf6e8c10c0e67406ab161042d4f874e6fdf0567d7f4e09

              SHA512

              320900924f5eabd3e7d7d67d43b24c75ac11157b58fa93ae17ed7fec0463a8dc50f3a45b6b975b3e0c448a3cc8dd4a75bd713346e757afcd2c11cf5ccc409af5