Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe
-
Size
121KB
-
MD5
b2fb4192e728e5a7e17c7dab1915a04b
-
SHA1
4a97d1d690e0a9754aaa4ed8f522f82487e60c89
-
SHA256
f557f4ffaeab48a1023a3101282ae7821f550b4377d52ffc2082c4f2be4f45c5
-
SHA512
7835382a0261f29ce0a6c2cd3ed8eed3a45e82ae0da8dc6eda682365cd31e88e7d39452d1476d62fc9b5f8b77725870b8b9fbb47650e9b19d055d600a13e53ef
-
SSDEEP
3072:txJFUCqflQ6DN9RNzQTbESAJMhNPxHWMyShAElhIg:tTSCq2iNPNz94JxH5EEP
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\EventSystem\Parameters\ServiceDll = "C:\\WINDOWS\\system32\\es.dll" b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\usnsvc.dll b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\msnback.bat b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3284 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 87 PID 1144 wrote to memory of 3284 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 87 PID 1144 wrote to memory of 3284 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 87 PID 3284 wrote to memory of 3196 3284 net.exe 89 PID 3284 wrote to memory of 3196 3284 net.exe 89 PID 3284 wrote to memory of 3196 3284 net.exe 89 PID 1144 wrote to memory of 636 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 93 PID 1144 wrote to memory of 636 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 93 PID 1144 wrote to memory of 636 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 93 PID 1144 wrote to memory of 3788 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 94 PID 1144 wrote to memory of 3788 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 94 PID 1144 wrote to memory of 3788 1144 b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe 94 PID 636 wrote to memory of 2468 636 net.exe 97 PID 636 wrote to memory of 2468 636 net.exe 97 PID 636 wrote to memory of 2468 636 net.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2fb4192e728e5a7e17c7dab1915a04b_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\net.exenet stop wmdmpmsn2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wmdmpmsn3⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
-
C:\Windows\SysWOW64\net.exenet start wmdmpmsn2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start wmdmpmsn3⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\msnback.bat2⤵
- System Location Discovery: System Language Discovery
PID:3788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD5ccf307f28833f0e00fa3bac330b3c745
SHA1d4d38f6cc8df98b0995233c633f765064746d6f9
SHA2567085e4d7243f32aea072aadc0bc40d82c5191289683eedc0654127922c0a79bf
SHA512d58e797195a39f8ac64d79db87738a159156c02276a9891dc9ece55e52e920e48fa63620809e55f618129bbfdfa5422685517f2895624d7e3e5cfb4a817a0c4e