Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 22:30

General

  • Target

    bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    bf8c3b61ba5f6d78303aa40f6b9a639b

  • SHA1

    0a00949876ad02f4d4a233aa81c9f65ac7f717d2

  • SHA256

    570d630957aa4a43f90a3003d01670efbf7cefd92119433526f446e3e3f26e5a

  • SHA512

    1cd3356798674069e187e15b81f8ebf5dd40823f12e3fb10fdfd2fd2fecc78cb18fc9a980173b72f6bc6ff0fd7b280b42ad7031bdd7ccd239598cfb76bcc10e2

  • SSDEEP

    768:zeq5YtQ4Him7u0b0hrqv4fd08D9utAuiKvM0OBWgjUq8M:zzmC4Jy0bEGQlIAYvM0rI8

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 11 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3824
    • C:\Windows\SysWOW64\net.exe
      net stop cryptsvc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop cryptsvc
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3020
    • C:\Windows\SysWOW64\sc.exe
      sc config cryptsvc start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:5112
    • C:\Windows\SysWOW64\sc.exe
      sc delete cryptsvc
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3516
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Users\Admin\AppData\Local\Temp\1724538630.dat, ServerMain c:\users\admin\appdata\local\temp\bf8c3b61ba5f6d78303aa40f6b9a639b_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1724538630.dat

    Filesize

    33KB

    MD5

    5281293894a7cc29cf562e989e9880e3

    SHA1

    68c3e490742fe84f64c4176e67f9b91709ae5150

    SHA256

    adb30f8fcfb8d43355e4dc8a00b6e9556d9944a9c4883cffb714c2e2c3462368

    SHA512

    47ac44530308782c390002610e1dfc96a3f948bda39cc054a8740b897bcb80704a28e439473d556bdea8f4bad07da4b6405efb91fab52f050e9a8d54f4745703

  • memory/3824-0-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3824-13-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB