Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 17:41

General

  • Target

    e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe

  • Size

    183KB

  • MD5

    e0b1d7fad1577f998fbd7f3b1ad736b0

  • SHA1

    27569fc55ad843f50b2f8256a5a76566303942f3

  • SHA256

    2f760f8bc2eaca3df20fafdaeb10424ecd6d0ee7e2260a1b02d90be7bb8496d5

  • SHA512

    209e1282b29c6bc37d6f9ac36cdc3d6b75a224270b38b27afec21b914294ae09563dcf321edbc9226f2715b922df2640c5d6b8fefbbff57f9c812e7b77201aba

  • SSDEEP

    3072:33GCZi+u93O+KNr9hoOVGToadTutNNubNVFywb9Ve4kZJcMKQv+C25MOLdUr9hoO:KvWo/ToUatvubNawb9VOExRCiMOEo

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 36 IoCs
  • Drops file in System32 directory 14 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0b1d7fad1577f998fbd7f3b1ad736b0_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:640
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:952
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4424
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2172
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3052
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:5068
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2320
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3480
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4652
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4420
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3580
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4444
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    183KB

    MD5

    33d1e0c3a81ba3dcb1d94c8a36cfe0dd

    SHA1

    426f30d1e46600425824619f86bf143dd1690d76

    SHA256

    641aef8c6a4426cca37c59f53dc9d4a07281ac6f87801eda298308e8888bc89f

    SHA512

    f2021d5be0ce348cec515d28de62b90e64d850181684dbdc02117aa7905227b3d67b794c4dfaa1fff58683f56c2f1010bfb5956c79e72e17074321956b3d355e

  • memory/640-0-0x0000000000900000-0x0000000000922000-memory.dmp

    Filesize

    136KB

  • memory/640-16-0x0000000000900000-0x0000000000922000-memory.dmp

    Filesize

    136KB

  • memory/952-22-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/952-7-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/2172-24-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/2172-23-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/2320-47-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/2320-48-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3052-31-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3052-32-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3052-33-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3480-54-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3580-73-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/3580-75-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4420-69-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4420-68-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4424-13-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4424-14-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4424-15-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4652-60-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4652-61-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/4996-88-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/5068-37-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB

  • memory/5068-40-0x00000000750F0000-0x0000000075112000-memory.dmp

    Filesize

    136KB