Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe
-
Size
163KB
-
MD5
dd3ce8dbf0a47cc0f8e79674e94ea0b2
-
SHA1
d57a1fea678d6f2d90f970a18ac28cadef00e453
-
SHA256
f1e0924d922cf0a152c235418798e6b84cba8382142b29bdeb36a6919d7c2636
-
SHA512
41df0d9f2962f14c8b501c8e9bb2ef34f9f31d5595bdc18f5020e2f3933d9917923ad8e10b1d2781a64117b592e7ab3abd9f838719fa6219360e97ba0af5a1b2
-
SSDEEP
3072:jD6k69gPuAyEmiuqyaq7nRkWm5yyIw2z2MYCgN5fQjJKeYphEh5oX3Ya26KLiO9:X6klmAyEmiuqFq2P5yyIw2zECYRQlKe/
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\827.vir" laass.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\827.vir" rundll32.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 304 laass.exe -
Loads dropped DLL 7 IoCs
pid Process 2868 rundll32.exe 2804 cmd.exe 2804 cmd.exe 2804 cmd.exe 2804 cmd.exe 2804 cmd.exe 304 laass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:C:\\Progra~1\\%Progr~1\\DEST.BAT" laass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:C:\\Progra~1\\%Progr~1\\DEST.BAT" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Progra~1\%Program Files%\laass.exe dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Cest.bat dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\~ dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\827.vir dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\827.vir dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Dest.bat dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2816 sc.exe 2668 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 304 laass.exe 304 laass.exe 304 laass.exe 304 laass.exe 304 laass.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe 304 laass.exe 2868 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2868 rundll32.exe 304 laass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2804 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 29 PID 2420 wrote to memory of 2804 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 29 PID 2420 wrote to memory of 2804 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 29 PID 2420 wrote to memory of 2804 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 29 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2868 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 31 PID 2420 wrote to memory of 2912 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 32 PID 2420 wrote to memory of 2912 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 32 PID 2420 wrote to memory of 2912 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 32 PID 2420 wrote to memory of 2912 2420 dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe 32 PID 2804 wrote to memory of 2816 2804 cmd.exe 33 PID 2804 wrote to memory of 2816 2804 cmd.exe 33 PID 2804 wrote to memory of 2816 2804 cmd.exe 33 PID 2804 wrote to memory of 2816 2804 cmd.exe 33 PID 2804 wrote to memory of 2668 2804 cmd.exe 34 PID 2804 wrote to memory of 2668 2804 cmd.exe 34 PID 2804 wrote to memory of 2668 2804 cmd.exe 34 PID 2804 wrote to memory of 2668 2804 cmd.exe 34 PID 2804 wrote to memory of 304 2804 cmd.exe 35 PID 2804 wrote to memory of 304 2804 cmd.exe 35 PID 2804 wrote to memory of 304 2804 cmd.exe 35 PID 2804 wrote to memory of 304 2804 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd3ce8dbf0a47cc0f8e79674e94ea0b2_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Progra~1\%Program Files%\Dest.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\sc.exesc \\10.127.1.42 create "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own displayname= "WinAudio"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\sc.exesc \\10.127.1.42 config "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own obj= localsystem password= ""3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" 827.vir main3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:304
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" 827.vir main2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\DD3CE8~1.EXE > nul & rd c:\%Progr~1 > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c3b22c388347ff02ea62ec99b1197eb5
SHA114af1545f00fb7ac5558e8210625ecead9b2f2cb
SHA2566991a92b6ddbae5fc98ca9455e88fc5685ead8f3abe6b09b776fc0f6ae8f46f1
SHA512d61a6ca71d05b65b7543f30394878535e36c601995ea6bf5f8f35196677fb500b4257844d22125dad082dbb2bcc63608196aef663f47892b80dcc99f470557dd
-
Filesize
140KB
MD59e6415b1969823662bf5f7dd7e30118d
SHA124eabc2a23edff4e7f48da13293275270d6c8e7f
SHA256da92b2216eb4bb4d0b9edfaa0f690b3665b336f410d8450932cfd4161f04bb46
SHA5124c820c51218adaacea3c8aad2c33b66ae9e05c04362a74bfc1d6088faa3a0c0e2cd5ca1d1392f65442727dcb1631c609802bf0b650027b7181e6f714155b85da
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff
-
Filesize
73B
MD5674ea842bba90c498bcbbb2a37476781
SHA16d8609760787a5f38fb04863c78dae460aceb6cb
SHA256629982cae8384a2d75d058766d510e5cbeb28f649650573a2b44b3fa58ec36cc
SHA5120504f3c85cf84ff612d00a8a0ddf7ac5e1577702409a5da0daf84d9569edf13e9613a9eb0b35e3014d4db76e0480cc81fba413d12427ed1ea9a721b8e563e98b