Analysis

  • max time kernel
    137s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 08:48

General

  • Target

    b2d1903f12411593c4ddd0fccde50319_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    b2d1903f12411593c4ddd0fccde50319

  • SHA1

    ba9f90f96f92d0c040a61de8939ae2a0f2d2b5c9

  • SHA256

    a2fb397461d74213d9861d87d880390299d395a26852c0d1c30337bcb6e4567e

  • SHA512

    fdeb887c20d9ff21ebcf0c8f2d30759c37838324c6232e5b03bd5c00a74c23bd6385cf96a26b9a38d2c770892e7db6c68ce94ebf0f3c538c5ee4889162ece159

  • SSDEEP

    3072:mtaBk6WvG9v4j63IWg/1y14FDTZ2WRDiPa3TBft8nIiHtLlmI:GaBk6Wvgvw7H/8167hiPa3TBl8nIiHtT

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 10 IoCs
  • Drops file in System32 directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d1903f12411593c4ddd0fccde50319_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d1903f12411593c4ddd0fccde50319_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1420
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1188
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4948
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4088
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s nla
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2744
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s ntmssvc
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4820
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s nwcworkstation
    1⤵
    • System Location Discovery: System Language Discovery
    PID:716
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s srservice
    1⤵
    • System Location Discovery: System Language Discovery
    PID:744
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s wmi
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4352
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s wmdmpmsp
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2276
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s logonhours
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\ntfastuserswitchingcompatibility.dll

    Filesize

    148KB

    MD5

    128067392b6d92487e6b3fe5b2289069

    SHA1

    2d7af881e89e075715eab0a419e41afda1d113dd

    SHA256

    b9a92e73f2187ddaf47806b437fccf702269e44e83a70b366a79a8ba85889ddc

    SHA512

    5894a5b2e985c5b4bd03ab55efdf33f2c8050157e6933be83a7634d977fa6a8d9c4ba523e484f3be1aa0327490612d93bd6f5e16227fea2965a9d99048491624