Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe
-
Size
84KB
-
MD5
b26992fe8fd1208bb2aad1f0fc8eb1bf
-
SHA1
0af8ba5f45c6a5b918a0ca0d1e64a3a72608081a
-
SHA256
e7010ff576b408ac5824f52e9773bda76d00bf2f38b90f16772934e2798bb4d9
-
SHA512
1e26da46a5dd4c1402a1f5eb5eaa40c1f202c5da95a1f7d4e76347a4e1ec7927b43f21312eb266504d79a6f2c86e9a09ad285921515a3642a2760c2b597df2ca
-
SSDEEP
1536:h6ggfUfojGnRR1J0+6Q230jgBhVulU8KgKFVXljQG6q8+t:h6uxJ0+yBz6jK9XtQ88+t
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\Wdcp.dll" laass.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\Wdcp.dll" rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023415-22.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 laass.exe -
Loads dropped DLL 2 IoCs
pid Process 3000 laass.exe 1208 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" laass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Progra~1\%Program Files%\~ b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Wdcp.dll b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\Wdcp.dll b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File opened for modification \??\c:\Program Files\%Program Files% b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\laass.exe b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\363.VBS b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Cest.bat b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\best.bat b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe File created C:\windows\362.vbs b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laass.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 3000 laass.exe 3000 laass.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe 3000 laass.exe 3000 laass.exe 1208 rundll32.exe 1208 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3000 laass.exe 1208 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4256 wrote to memory of 3000 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 89 PID 4256 wrote to memory of 3000 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 89 PID 4256 wrote to memory of 3000 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 89 PID 4256 wrote to memory of 1208 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 90 PID 4256 wrote to memory of 1208 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 90 PID 4256 wrote to memory of 1208 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 90 PID 4256 wrote to memory of 4396 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 91 PID 4256 wrote to memory of 4396 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 91 PID 4256 wrote to memory of 4396 4256 b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b26992fe8fd1208bb2aad1f0fc8eb1bf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" Wdcp.dll main2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3000
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" Wdcp.dll main2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B26992~1.EXE > nul & rd c:\%Progr~1 > nul2⤵
- System Location Discovery: System Language Discovery
PID:4396
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD5cd9101c09f75939663cec188b7914dec
SHA147c7da31867d5930fb5215c4adf3a56e71461e6e
SHA2561d6831782d73aea9e813b2452f5304f5715432cbfcea3756bc69e46ce8fb848f
SHA51297f084515ee9a89ba98b678810eac14a46fc4e1d8c65f3be4cb26e73d7e38f4ad31de6856ec663b756525a2f83d28dea07907189905c90db3eff34d0c03b24d9
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff
-
Filesize
90B
MD52decc7673a337ecad80bbbfed8a524bb
SHA17a0ade42fc8d51817572919584e0ef1a3c7bf18c
SHA2567290f853e512f2c5d401ac03dbcb2e5f0dd6bf27e5dc51b7f476a33ea9d94974
SHA5128c608695079866acc9c2d4486841688f93cc1e632534058c9ffbb7e95c197a0e4ac6da422ce67a60aca7ccd887df85c3cd225f24d0214b050ffa98cb76145d82