Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe
-
Size
77KB
-
MD5
cf3f3ffd61f630fd9980f1b2c5eeb984
-
SHA1
e617fab49ea365f8929dfb29f72fbb49f3603368
-
SHA256
2e5305df2ce11cc1622e8f917f33f636bacaa694b62fa9548ee1ab508408c2ea
-
SHA512
43c564b64a7dacb5525d15eb56eca030f76c8abb9f32df059cac2e36eac8867e3e420b8795b240afcaed06dd16807b347da8dfef3188c0d62267948811856aff
-
SSDEEP
1536:Bvz1Q27x4i3zY/Z8czzxL8rae191keFQFxyYj9mLppocA:Bvx7G+zoZFz98R1OxyYj9nX
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe -
Loads dropped DLL 36 IoCs
pid Process 3432 svchost.exe 3432 svchost.exe 3432 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 4344 svchost.exe 4344 svchost.exe 4344 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 3444 svchost.exe 3444 svchost.exe 3444 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 4380 svchost.exe 4380 svchost.exe 4380 svchost.exe 2612 svchost.exe 2612 svchost.exe 2612 svchost.exe 2916 svchost.exe 2916 svchost.exe 2916 svchost.exe 2068 svchost.exe 2068 svchost.exe 2068 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SRService.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nla.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe 2356 cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf3f3ffd61f630fd9980f1b2c5eeb984_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3432
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4344
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2692
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3444
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2328
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3176
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1260
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4380
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2612
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2916
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5717286673641750aeb9b27057846fe3d
SHA18528b633264bb4e173b69d787fba8cdcc6fe1f75
SHA256f4b407c8e2096cd124bc9f4dac289707bf96abfd659f9b7fa853a515a3ccb655
SHA51255026801a83de7e4c2beee9842cddd25927fa28b7ea6275e3dd23d719e026c15e57d53149de6d1cc583cb3d599b158e9c24a588a84188ec6a19d54a7e25206e4