Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe
-
Size
79KB
-
MD5
b294e18e7cba198d748cdcee578d59de
-
SHA1
48fa0d21c63150e6dc80b99812c0bc7ec9606d62
-
SHA256
724333d57a79efd6b56ef0451206d4c04c90f6ed85e363bfd26c43d7f2ff5124
-
SHA512
bd3f88fc8446d879fe97970722e8602ed87be29f9b50805d4cd393c4ac1b92b1811a4d8471f9b3fe56726801b1d11081e99e0f09dba6d583f5d86dadbd633383
-
SSDEEP
1536:5WFro3Zoa+O9lmUPpk6iN5z0OvmiwJfrhl:5Wg4PN5FYr
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3948 Rundll32.exe 1968 Rundll32.exe 1968 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mnma.dll b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe File created C:\Windows\SysWOW64\ltna.dll b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2500 sc.exe 408 sc.exe 2844 sc.exe 2840 sc.exe 3840 sc.exe 2416 sc.exe 3920 sc.exe 3124 sc.exe 2360 sc.exe 3276 sc.exe 3000 sc.exe 4408 sc.exe 3428 sc.exe 2928 sc.exe 4780 sc.exe 2968 sc.exe 2368 sc.exe 2420 sc.exe 3932 sc.exe 4120 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe 3948 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4624 b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3948 4624 b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe 84 PID 4624 wrote to memory of 3948 4624 b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe 84 PID 4624 wrote to memory of 3948 4624 b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe 84 PID 3948 wrote to memory of 2360 3948 Rundll32.exe 85 PID 3948 wrote to memory of 2360 3948 Rundll32.exe 85 PID 3948 wrote to memory of 2360 3948 Rundll32.exe 85 PID 3948 wrote to memory of 2500 3948 Rundll32.exe 86 PID 3948 wrote to memory of 2500 3948 Rundll32.exe 86 PID 3948 wrote to memory of 2500 3948 Rundll32.exe 86 PID 3948 wrote to memory of 4120 3948 Rundll32.exe 87 PID 3948 wrote to memory of 4120 3948 Rundll32.exe 87 PID 3948 wrote to memory of 4120 3948 Rundll32.exe 87 PID 3948 wrote to memory of 3276 3948 Rundll32.exe 88 PID 3948 wrote to memory of 3276 3948 Rundll32.exe 88 PID 3948 wrote to memory of 3276 3948 Rundll32.exe 88 PID 3948 wrote to memory of 3124 3948 Rundll32.exe 89 PID 3948 wrote to memory of 3124 3948 Rundll32.exe 89 PID 3948 wrote to memory of 3124 3948 Rundll32.exe 89 PID 3948 wrote to memory of 3920 3948 Rundll32.exe 90 PID 3948 wrote to memory of 3920 3948 Rundll32.exe 90 PID 3948 wrote to memory of 3920 3948 Rundll32.exe 90 PID 3948 wrote to memory of 3840 3948 Rundll32.exe 92 PID 3948 wrote to memory of 3840 3948 Rundll32.exe 92 PID 3948 wrote to memory of 3840 3948 Rundll32.exe 92 PID 3948 wrote to memory of 3428 3948 Rundll32.exe 93 PID 3948 wrote to memory of 3428 3948 Rundll32.exe 93 PID 3948 wrote to memory of 3428 3948 Rundll32.exe 93 PID 3948 wrote to memory of 2840 3948 Rundll32.exe 95 PID 3948 wrote to memory of 2840 3948 Rundll32.exe 95 PID 3948 wrote to memory of 2840 3948 Rundll32.exe 95 PID 3948 wrote to memory of 3932 3948 Rundll32.exe 96 PID 3948 wrote to memory of 3932 3948 Rundll32.exe 96 PID 3948 wrote to memory of 3932 3948 Rundll32.exe 96 PID 3948 wrote to memory of 2420 3948 Rundll32.exe 97 PID 3948 wrote to memory of 2420 3948 Rundll32.exe 97 PID 3948 wrote to memory of 2420 3948 Rundll32.exe 97 PID 3948 wrote to memory of 2844 3948 Rundll32.exe 98 PID 3948 wrote to memory of 2844 3948 Rundll32.exe 98 PID 3948 wrote to memory of 2844 3948 Rundll32.exe 98 PID 3948 wrote to memory of 2368 3948 Rundll32.exe 99 PID 3948 wrote to memory of 2368 3948 Rundll32.exe 99 PID 3948 wrote to memory of 2368 3948 Rundll32.exe 99 PID 3948 wrote to memory of 2416 3948 Rundll32.exe 100 PID 3948 wrote to memory of 2416 3948 Rundll32.exe 100 PID 3948 wrote to memory of 2416 3948 Rundll32.exe 100 PID 3948 wrote to memory of 2968 3948 Rundll32.exe 101 PID 3948 wrote to memory of 2968 3948 Rundll32.exe 101 PID 3948 wrote to memory of 2968 3948 Rundll32.exe 101 PID 3948 wrote to memory of 408 3948 Rundll32.exe 103 PID 3948 wrote to memory of 408 3948 Rundll32.exe 103 PID 3948 wrote to memory of 408 3948 Rundll32.exe 103 PID 3948 wrote to memory of 4408 3948 Rundll32.exe 104 PID 3948 wrote to memory of 4408 3948 Rundll32.exe 104 PID 3948 wrote to memory of 4408 3948 Rundll32.exe 104 PID 3948 wrote to memory of 4780 3948 Rundll32.exe 105 PID 3948 wrote to memory of 4780 3948 Rundll32.exe 105 PID 3948 wrote to memory of 4780 3948 Rundll32.exe 105 PID 3948 wrote to memory of 3000 3948 Rundll32.exe 106 PID 3948 wrote to memory of 3000 3948 Rundll32.exe 106 PID 3948 wrote to memory of 3000 3948 Rundll32.exe 106 PID 3948 wrote to memory of 2928 3948 Rundll32.exe 107 PID 3948 wrote to memory of 2928 3948 Rundll32.exe 107 PID 3948 wrote to memory of 2928 3948 Rundll32.exe 107 PID 3948 wrote to memory of 4624 3948 Rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b294e18e7cba198d748cdcee578d59de_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\mnma.dll Execute2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Windows\SysWOW64\sc.exesc stop RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4120
-
-
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3276
-
-
C:\Windows\SysWOW64\sc.exesc stop McNASvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\sc.exesc delete McNASvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\sc.exesc stop MpfService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\sc.exesc delete MpfService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3428
-
-
C:\Windows\SysWOW64\sc.exesc stop McProxy3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\sc.exesc delete McProxy3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3932
-
-
C:\Windows\SysWOW64\sc.exesc stop McShield3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Windows\SysWOW64\sc.exesc delete McShield3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\sc.exesc stop McODS3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\sc.exesc delete McODS3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\sc.exesc stop mcmscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\sc.exesc delete mcmscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\sc.exesc stop McSysmon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\sc.exesc delete McSysmon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\sc.exesc stop ekrn3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\sc.exesc delete ekrn3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\ltna.dll Execute2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD585aa9639f8bb0d6eed673a8274b48e00
SHA17cb2187d4fea4495d5e1bac2dc2327afd2511416
SHA2562ddbd07ddfda5d4f9b1c44c8ff16f7e38027d275af6bf57f317b136060d695a9
SHA5129af7c108b244a8b12f27d57e9e52cd4a8066f200aba03b77e1f6100f386f15670d89f00d57afff5960af7336337bfb885ac7cf5a8ea0323d5711bf3b51ffc9c1
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
8KB
MD568fc17d525510a480d24e2161ef742cc
SHA1ac2fd933345cf37fd381cabe8a94b183e6bd7c41
SHA256c0f4820660edacf4225473ffed81b37a7009a8c323228459c2ca8068c6dcabcf
SHA512bafb1a3a63406d3479bde68aac05f48453574df08069d7f29c6cd1999ae1d8c5c61e4864315bfe91d045338dcbf006c3e79aa0197d249b8c9d4ed76befdd017a
-
Filesize
14KB
MD5ca1ed5dccd9870d95f57763145dfbb48
SHA1b40319735fd1e9bc978bb267f8e5f46ebb60e393
SHA256c59cdac86482e5208569803b884d1aed3b60d8f98a413babf097b32dde20544b
SHA512a6897c65955c4d1b6d7fea61762211be1aec3da4d879dd8923420353c8309f26766ef977b3338bfbf120ed209c69e328feb1bf148e98db1c6d7164c2094ba62c