Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 22:30
Behavioral task
behavioral1
Sample
bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe
-
Size
33KB
-
MD5
bf8c3b61ba5f6d78303aa40f6b9a639b
-
SHA1
0a00949876ad02f4d4a233aa81c9f65ac7f717d2
-
SHA256
570d630957aa4a43f90a3003d01670efbf7cefd92119433526f446e3e3f26e5a
-
SHA512
1cd3356798674069e187e15b81f8ebf5dd40823f12e3fb10fdfd2fd2fecc78cb18fc9a980173b72f6bc6ff0fd7b280b42ad7031bdd7ccd239598cfb76bcc10e2
-
SSDEEP
768:zeq5YtQ4Him7u0b0hrqv4fd08D9utAuiKvM0OBWgjUq8M:zzmC4Jy0bEGQlIAYvM0rI8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1600 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 rundll32.exe -
resource yara_rule behavioral2/memory/3824-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3824-13-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\yumidimap.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp18.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\yuksuser.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3516 sc.exe 5112 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3824 wrote to memory of 1612 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 86 PID 3824 wrote to memory of 1612 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 86 PID 3824 wrote to memory of 1612 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 86 PID 3824 wrote to memory of 5112 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 87 PID 3824 wrote to memory of 5112 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 87 PID 3824 wrote to memory of 5112 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 87 PID 3824 wrote to memory of 3516 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 88 PID 3824 wrote to memory of 3516 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 88 PID 3824 wrote to memory of 3516 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 88 PID 3824 wrote to memory of 1600 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 92 PID 3824 wrote to memory of 1600 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 92 PID 3824 wrote to memory of 1600 3824 bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe 92 PID 1612 wrote to memory of 3020 1612 net.exe 93 PID 1612 wrote to memory of 3020 1612 net.exe 93 PID 1612 wrote to memory of 3020 1612 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf8c3b61ba5f6d78303aa40f6b9a639b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1724538630.dat, ServerMain c:\users\admin\appdata\local\temp\bf8c3b61ba5f6d78303aa40f6b9a639b_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55281293894a7cc29cf562e989e9880e3
SHA168c3e490742fe84f64c4176e67f9b91709ae5150
SHA256adb30f8fcfb8d43355e4dc8a00b6e9556d9944a9c4883cffb714c2e2c3462368
SHA51247ac44530308782c390002610e1dfc96a3f948bda39cc054a8740b897bcb80704a28e439473d556bdea8f4bad07da4b6405efb91fab52f050e9a8d54f4745703