Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
-
Size
427KB
-
MD5
ea902884bf793caa8a16364ea446fad8
-
SHA1
340ff7ccda6536070943185e2300a3d966884c18
-
SHA256
882a02d0ba1c222f0d6c3e35e3853b82cfad086d3649f86307c0c3e123a75323
-
SHA512
be019105911e855380f76e0b8d388625ab331bfcaf5e718b0cb1246c5d89694437b440dd70c4388b8d5d632a5e37f71748d78f0d1255bba4059f0b47f799f89d
-
SSDEEP
12288:cqmpplpGoGL3etQoMiXM8gxf/Sj4yho2su73I:+563ey8gZqj4yhogU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} lncom.exe -
resource yara_rule behavioral1/files/0x0008000000016d63-51.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1780 lncom.exe 3060 fservice.exe 2932 services.exe -
Loads dropped DLL 10 IoCs
pid Process 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 1780 lncom.exe 1780 lncom.exe 2932 services.exe 2932 services.exe 3060 fservice.exe 1780 lncom.exe 2908 DllHost.exe 2924 WerFault.exe -
resource yara_rule behavioral1/memory/2120-24-0x0000000007BB0000-0x0000000007DAC000-memory.dmp upx behavioral1/files/0x000b000000012266-16.dat upx behavioral1/memory/1780-25-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/3060-40-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/3060-62-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/1780-68-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2932-69-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/1780-70-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/1780-81-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\lncom.exe ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\lncom.exe.bat lncom.exe File created C:\Windows\SysWOW64\lncom_.jpg ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File opened for modification C:\Windows\SysWOW64\lncom_.jpg DllHost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe lncom.exe File opened for modification C:\Windows\system\sservice.exe lncom.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2924 2932 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lncom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 services.exe 2932 services.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 services.exe 2932 services.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1780 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1780 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1780 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1780 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2732 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2732 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2732 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 32 PID 2120 wrote to memory of 2732 2120 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 32 PID 1780 wrote to memory of 3060 1780 lncom.exe 34 PID 1780 wrote to memory of 3060 1780 lncom.exe 34 PID 1780 wrote to memory of 3060 1780 lncom.exe 34 PID 1780 wrote to memory of 3060 1780 lncom.exe 34 PID 3060 wrote to memory of 2932 3060 fservice.exe 35 PID 3060 wrote to memory of 2932 3060 fservice.exe 35 PID 3060 wrote to memory of 2932 3060 fservice.exe 35 PID 3060 wrote to memory of 2932 3060 fservice.exe 35 PID 2932 wrote to memory of 2240 2932 services.exe 36 PID 2932 wrote to memory of 2240 2932 services.exe 36 PID 2932 wrote to memory of 2240 2932 services.exe 36 PID 2932 wrote to memory of 2240 2932 services.exe 36 PID 2932 wrote to memory of 2640 2932 services.exe 37 PID 2932 wrote to memory of 2640 2932 services.exe 37 PID 2932 wrote to memory of 2640 2932 services.exe 37 PID 2932 wrote to memory of 2640 2932 services.exe 37 PID 2640 wrote to memory of 2244 2640 NET.exe 40 PID 2640 wrote to memory of 2244 2640 NET.exe 40 PID 2640 wrote to memory of 2244 2640 NET.exe 40 PID 2640 wrote to memory of 2244 2640 NET.exe 40 PID 2240 wrote to memory of 2752 2240 NET.exe 41 PID 2240 wrote to memory of 2752 2240 NET.exe 41 PID 2240 wrote to memory of 2752 2240 NET.exe 41 PID 2240 wrote to memory of 2752 2240 NET.exe 41 PID 2932 wrote to memory of 2924 2932 services.exe 42 PID 2932 wrote to memory of 2924 2932 services.exe 42 PID 2932 wrote to memory of 2924 2932 services.exe 42 PID 2932 wrote to memory of 2924 2932 services.exe 42 PID 1780 wrote to memory of 264 1780 lncom.exe 44 PID 1780 wrote to memory of 264 1780 lncom.exe 44 PID 1780 wrote to memory of 264 1780 lncom.exe 44 PID 1780 wrote to memory of 264 1780 lncom.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 6125⤵
- Loads dropped DLL
- Program crash
PID:2924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SysWOW64\lncom.exe.bat3⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EA9028~1.EXE.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5a019d525e1a9d83b23dc7a0314dc699f
SHA1089134b3f09c4e9dc56f189a2b7301f8d7c14492
SHA2560b4a70477cbee3a21709b274fad92074e12f22a8bd6c7d5c67d46e794abbb25a
SHA5122930bc2642dbd0dd2592cc3318ffe839ff1b09be4f960462bac09b97fe4beccd83f8fd0220ea634469113e950b9a968d7512d09dfd87804721c0b840d92e233c
-
Filesize
342KB
MD5b8df37ff836b6ddff066de7b468aec25
SHA15426510669ba41c120f7eceb771563792900adf6
SHA256428b50c46caeb23da13f75f3d8c0d617724500bbed059bc3000d223ac2134d3c
SHA512af527d3dd62ab31d75e60d10503399a00ba5f7fca4bca1b7e95d7a8e32f0847fdb469a47a47aea729aa9638d2e7dab2282537eeb282b8565d99ac30738abe173
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
80KB
MD5811bdc267226917d511634c3f3bd7f87
SHA10c32f96a4fe0bbf0fdb03153555f012f81003bcd
SHA256e3358250be3373c141063f2dd6dd0253b16692b456546bfd079e955890fcccd2
SHA512602f1c40af41a5dc093ba818d5d32e6139f2812073f6c6c7b9a73395ec2d68d72c66a7b987beb069b0292130057b2537b92632ec218a35a230b665b498de5f00
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066