Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
fcc165cc8486f520735036749247347a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fcc165cc8486f520735036749247347a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fcc165cc8486f520735036749247347a_JaffaCakes118.exe
-
Size
132KB
-
MD5
fcc165cc8486f520735036749247347a
-
SHA1
d2dee39dfa9e0b3c2ba6d9765d15f02d9708c454
-
SHA256
fc5499f9f9c4cd88af47e503db6acf4e7d6bd4f0bcf4e2dce1e9c395e3a84878
-
SHA512
30b74afb2073b75ef949e9bbe7749f1294499769b55da37b3e9ce78c024ec56817fb444cd086ab52fa60f3dc9b326c9cd97d97096eb4a11bd7f2efa686609e7c
-
SSDEEP
3072:8wyY4UqK3sx05cZ6g3BfQQ7cZuXlhEPG25QU/:5RyK3/5UpfQmflhEPG2u
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\tgi.sys fcc165cc8486f520735036749247347a_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3000 netsh.exe 2708 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ttgi\parameters\servicedll = "C:\\Windows\\system32\\tgi.dll" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 3812 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\tgi.dll fcc165cc8486f520735036749247347a_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3560 sc.exe 3016 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcc165cc8486f520735036749247347a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\internet explorer\main svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\C = "C" svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3812 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3516 wrote to memory of 2372 3516 fcc165cc8486f520735036749247347a_JaffaCakes118.exe 82 PID 3516 wrote to memory of 2372 3516 fcc165cc8486f520735036749247347a_JaffaCakes118.exe 82 PID 3516 wrote to memory of 2372 3516 fcc165cc8486f520735036749247347a_JaffaCakes118.exe 82 PID 2372 wrote to memory of 3000 2372 cmd.exe 84 PID 2372 wrote to memory of 3000 2372 cmd.exe 84 PID 2372 wrote to memory of 3000 2372 cmd.exe 84 PID 2372 wrote to memory of 2708 2372 cmd.exe 85 PID 2372 wrote to memory of 2708 2372 cmd.exe 85 PID 2372 wrote to memory of 2708 2372 cmd.exe 85 PID 2372 wrote to memory of 3560 2372 cmd.exe 86 PID 2372 wrote to memory of 3560 2372 cmd.exe 86 PID 2372 wrote to memory of 3560 2372 cmd.exe 86 PID 2372 wrote to memory of 3600 2372 cmd.exe 87 PID 2372 wrote to memory of 3600 2372 cmd.exe 87 PID 2372 wrote to memory of 3600 2372 cmd.exe 87 PID 2372 wrote to memory of 4088 2372 cmd.exe 88 PID 2372 wrote to memory of 4088 2372 cmd.exe 88 PID 2372 wrote to memory of 4088 2372 cmd.exe 88 PID 2372 wrote to memory of 692 2372 cmd.exe 89 PID 2372 wrote to memory of 692 2372 cmd.exe 89 PID 2372 wrote to memory of 692 2372 cmd.exe 89 PID 2372 wrote to memory of 3016 2372 cmd.exe 90 PID 2372 wrote to memory of 3016 2372 cmd.exe 90 PID 2372 wrote to memory of 3016 2372 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc165cc8486f520735036749247347a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcc165cc8486f520735036749247347a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\tgi.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram name="tgi" program="C:\Windows\system32\svchost.exe" mode=enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening tcp 8085 tgi enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\sc.exesc create "ttgi" type= share start= auto binpath= "C:\Windows\system32\svchost.exe -k ttgi"3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\system\currentcontrolset\services\ttgi\parameters" /v servicedll /t reg_expand_sz /d "C:\Windows\system32\tgi.dll" /f3⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\system\currentcontrolset\services\ttgi" /v failureactions /t reg_binary /d 00000000000000000000000003000000140000000100000060ea00000100000060ea00000100000060ea0000 /f3⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\svchost" /v ttgi /t reg_multi_sz /d "ttgi\0" /f3⤵
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\sc.exesc start ttgi3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ttgi -s ttgi1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:3812
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
683B
MD5d1964040dfa5765c66b726a38bb50db9
SHA176bf7b53f7fa1b654b43ba9c7896175360dc3d82
SHA256fa5765c5e959d1083c73aae0022ac76ca04566226df2f26192341ff4b772c194
SHA512a4d65aae388b9dd8a9fc85c56d45a4d89b672a4c25ec42bbf92e772d4d9a68b057739f97832ae90cbbed995b8985241b19447a2536673c33d4654d99c4d0f373
-
Filesize
51KB
MD51baeb01755c8b482301e06c1305d2c90
SHA11a8afb4922e3bd4c39b28c591f03459a6d66b617
SHA2566788ae33903b2ddb216d7a3160b9bed5152d090cc76869c54b68f599de7570ac
SHA51287c871db6b5814a8faf299ed20b7f6c0a8275b2b8d5ca29df7326b68e5544698feff4c5db489bf11dd46d10102a06c7cee5f62ac7dd8f146ddb68f8fb8448c82