Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
-
Size
84KB
-
MD5
b26992fe8fd1208bb2aad1f0fc8eb1bf
-
SHA1
0af8ba5f45c6a5b918a0ca0d1e64a3a72608081a
-
SHA256
e7010ff576b408ac5824f52e9773bda76d00bf2f38b90f16772934e2798bb4d9
-
SHA512
1e26da46a5dd4c1402a1f5eb5eaa40c1f202c5da95a1f7d4e76347a4e1ec7927b43f21312eb266504d79a6f2c86e9a09ad285921515a3642a2760c2b597df2ca
-
SSDEEP
1536:h6ggfUfojGnRR1J0+6Q230jgBhVulU8KgKFVXljQG6q8+t:h6uxJ0+yBz6jK9XtQ88+t
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\Wdcp.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\Wdcp.dll" laass.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000016d21-20.dat acprotect -
Deletes itself 1 IoCs
pid Process 1160 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 laass.exe -
Loads dropped DLL 7 IoCs
pid Process 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 2860 laass.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" laass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification \??\c:\Program Files\%Program Files% b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\laass.exe b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\363.VBS b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Cest.bat b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\~ b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Wdcp.dll b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\Wdcp.dll b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\best.bat b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\windows\362.vbs b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 2860 laass.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe 2860 laass.exe 880 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2860 laass.exe 880 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2860 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2860 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2860 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 2860 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 30 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 880 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 31 PID 2484 wrote to memory of 1160 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 32 PID 2484 wrote to memory of 1160 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 32 PID 2484 wrote to memory of 1160 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 32 PID 2484 wrote to memory of 1160 2484 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" Wdcp.dll main2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2860
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" Wdcp.dll main2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B26992~1.EXE > nul & rd c:\%Progr~1 > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD528b658b9ec748fb8cd29846300dffe00
SHA18676f96b7903c6a94033a6ef24a2f3a3ca7a6dc0
SHA256e90dc557b566913c2394811b28b0ed10e29d54c582cc2826e0506e4e79406d53
SHA512434286d885eff43fcab72fd2f2eb0a9b65d3600f61cbf2961d164a76c537b409f386ba01c4ca17ffe7a99e928296f39f700ec8f579eeeb8aaefc6cbea824c003
-
Filesize
90B
MD52decc7673a337ecad80bbbfed8a524bb
SHA17a0ade42fc8d51817572919584e0ef1a3c7bf18c
SHA2567290f853e512f2c5d401ac03dbcb2e5f0dd6bf27e5dc51b7f476a33ea9d94974
SHA5128c608695079866acc9c2d4486841688f93cc1e632534058c9ffbb7e95c197a0e4ac6da422ce67a60aca7ccd887df85c3cd225f24d0214b050ffa98cb76145d82
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff