Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe
-
Size
427KB
-
MD5
ea902884bf793caa8a16364ea446fad8
-
SHA1
340ff7ccda6536070943185e2300a3d966884c18
-
SHA256
882a02d0ba1c222f0d6c3e35e3853b82cfad086d3649f86307c0c3e123a75323
-
SHA512
be019105911e855380f76e0b8d388625ab331bfcaf5e718b0cb1246c5d89694437b440dd70c4388b8d5d632a5e37f71748d78f0d1255bba4059f0b47f799f89d
-
SSDEEP
12288:cqmpplpGoGL3etQoMiXM8gxf/Sj4yho2su73I:+563ey8gZqj4yhogU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
resource yara_rule behavioral2/files/0x0009000000023498-37.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4212 lncom.exe 1956 fservice.exe 60 services.exe -
Loads dropped DLL 5 IoCs
pid Process 60 services.exe 60 services.exe 60 services.exe 1956 fservice.exe 4212 lncom.exe -
resource yara_rule behavioral2/files/0x0008000000023490-5.dat upx behavioral2/memory/4212-15-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/1956-25-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/1956-50-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4212-52-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4212-57-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-59-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-60-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-62-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-64-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-66-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-68-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-70-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-72-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-74-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-76-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-78-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-80-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-82-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-84-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/60-86-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File opened for modification C:\Windows\SysWOW64\fservice.exe lncom.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\fservice.exe lncom.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\lncom.exe.bat lncom.exe File created C:\Windows\SysWOW64\lncom.exe ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe File created C:\Windows\SysWOW64\lncom_.jpg ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system\sservice.exe lncom.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe lncom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lncom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe 60 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 60 services.exe 60 services.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4212 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 84 PID 2264 wrote to memory of 4212 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 84 PID 2264 wrote to memory of 4212 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 84 PID 2264 wrote to memory of 3380 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 85 PID 2264 wrote to memory of 3380 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 85 PID 2264 wrote to memory of 3380 2264 ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe 85 PID 4212 wrote to memory of 1956 4212 lncom.exe 87 PID 4212 wrote to memory of 1956 4212 lncom.exe 87 PID 4212 wrote to memory of 1956 4212 lncom.exe 87 PID 1956 wrote to memory of 60 1956 fservice.exe 88 PID 1956 wrote to memory of 60 1956 fservice.exe 88 PID 1956 wrote to memory of 60 1956 fservice.exe 88 PID 60 wrote to memory of 4532 60 services.exe 89 PID 60 wrote to memory of 4532 60 services.exe 89 PID 60 wrote to memory of 4532 60 services.exe 89 PID 60 wrote to memory of 4572 60 services.exe 90 PID 60 wrote to memory of 4572 60 services.exe 90 PID 60 wrote to memory of 4572 60 services.exe 90 PID 4532 wrote to memory of 2924 4532 NET.exe 93 PID 4532 wrote to memory of 2924 4532 NET.exe 93 PID 4532 wrote to memory of 2924 4532 NET.exe 93 PID 4572 wrote to memory of 4276 4572 NET.exe 94 PID 4572 wrote to memory of 4276 4572 NET.exe 94 PID 4572 wrote to memory of 4276 4572 NET.exe 94 PID 4212 wrote to memory of 4852 4212 lncom.exe 99 PID 4212 wrote to memory of 4852 4212 lncom.exe 99 PID 4212 wrote to memory of 4852 4212 lncom.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea902884bf793caa8a16364ea446fad8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\lncom.exe.bat3⤵
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\EA9028~1.EXE.bat2⤵
- System Location Discovery: System Language Discovery
PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5a019d525e1a9d83b23dc7a0314dc699f
SHA1089134b3f09c4e9dc56f189a2b7301f8d7c14492
SHA2560b4a70477cbee3a21709b274fad92074e12f22a8bd6c7d5c67d46e794abbb25a
SHA5122930bc2642dbd0dd2592cc3318ffe839ff1b09be4f960462bac09b97fe4beccd83f8fd0220ea634469113e950b9a968d7512d09dfd87804721c0b840d92e233c
-
Filesize
342KB
MD5b8df37ff836b6ddff066de7b468aec25
SHA15426510669ba41c120f7eceb771563792900adf6
SHA256428b50c46caeb23da13f75f3d8c0d617724500bbed059bc3000d223ac2134d3c
SHA512af527d3dd62ab31d75e60d10503399a00ba5f7fca4bca1b7e95d7a8e32f0847fdb469a47a47aea729aa9638d2e7dab2282537eeb282b8565d99ac30738abe173
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
80KB
MD5811bdc267226917d511634c3f3bd7f87
SHA10c32f96a4fe0bbf0fdb03153555f012f81003bcd
SHA256e3358250be3373c141063f2dd6dd0253b16692b456546bfd079e955890fcccd2
SHA512602f1c40af41a5dc093ba818d5d32e6139f2812073f6c6c7b9a73395ec2d68d72c66a7b987beb069b0292130057b2537b92632ec218a35a230b665b498de5f00
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066