Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 17:41

General

  • Target

    e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe

  • Size

    183KB

  • MD5

    e0b1d7fad1577f998fbd7f3b1ad736b0

  • SHA1

    27569fc55ad843f50b2f8256a5a76566303942f3

  • SHA256

    2f760f8bc2eaca3df20fafdaeb10424ecd6d0ee7e2260a1b02d90be7bb8496d5

  • SHA512

    209e1282b29c6bc37d6f9ac36cdc3d6b75a224270b38b27afec21b914294ae09563dcf321edbc9226f2715b922df2640c5d6b8fefbbff57f9c812e7b77201aba

  • SSDEEP

    3072:33GCZi+u93O+KNr9hoOVGToadTutNNubNVFywb9Ve4kZJcMKQv+C25MOLdUr9hoO:KvWo/ToUatvubNawb9VOExRCiMOEo

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 24 IoCs
  • Drops file in System32 directory 14 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2828
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:840
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2696
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2568
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2220
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:988
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:884
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:336
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1440
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:932
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1820
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2932
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2928
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    183KB

    MD5

    33d1e0c3a81ba3dcb1d94c8a36cfe0dd

    SHA1

    426f30d1e46600425824619f86bf143dd1690d76

    SHA256

    641aef8c6a4426cca37c59f53dc9d4a07281ac6f87801eda298308e8888bc89f

    SHA512

    f2021d5be0ce348cec515d28de62b90e64d850181684dbdc02117aa7905227b3d67b794c4dfaa1fff58683f56c2f1010bfb5956c79e72e17074321956b3d355e

  • memory/336-48-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/840-8-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/884-43-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/884-41-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/932-56-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/932-54-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/988-37-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/988-36-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/1820-62-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/2220-29-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/2220-30-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/2468-79-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/2468-77-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/2568-23-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB

  • memory/2568-24-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/2696-16-0x0000000074340000-0x0000000074362000-memory.dmp

    Filesize

    136KB

  • memory/2696-17-0x0000000074310000-0x0000000074332000-memory.dmp

    Filesize

    136KB

  • memory/2828-11-0x0000000000150000-0x0000000000172000-memory.dmp

    Filesize

    136KB

  • memory/2828-1-0x0000000000150000-0x0000000000172000-memory.dmp

    Filesize

    136KB

  • memory/2828-3-0x00000000001A1000-0x00000000001A2000-memory.dmp

    Filesize

    4KB

  • memory/2828-10-0x0000000000180000-0x00000000001A2000-memory.dmp

    Filesize

    136KB

  • memory/2828-0-0x0000000000180000-0x00000000001A2000-memory.dmp

    Filesize

    136KB

  • memory/2932-68-0x0000000074860000-0x0000000074882000-memory.dmp

    Filesize

    136KB

  • memory/2932-67-0x0000000074890000-0x00000000748B2000-memory.dmp

    Filesize

    136KB