Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe
-
Size
291KB
-
MD5
fe74e997a5467841f5b915450e9d89e4
-
SHA1
e6b1433edb9906c504f0a1afdf7132a825743b22
-
SHA256
73e4ce6e3b6c1e9f92ea8bc8f7d65ff4df1e2ba6d78fad549caf4d226b6e26eb
-
SHA512
c5b372907fe939e6f00c53dee2c0cc5d6c444cc161541c6a10e12e5ee5a9143a9d3fbd3dff648d772f713eea9f38c4370d782ba8f0fa855a3a0eaf9b8a3ea396
-
SSDEEP
6144:qseuhm7O/klr2tqahdbzI6cxVcw5BbE2CApcv2M1XjWLiiacHpdt:MuhmJao5PCACvrTOi9O
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sysdt.sys winsmm.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DarkstSer\Parameters\ServiceDll = "C:\\Windows\\system32\\System64.dll" tempdir.exe -
Executes dropped EXE 3 IoCs
pid Process 1892 winsmm.exe 4052 tempdir.exe 3188 tempdir.exe -
Loads dropped DLL 2 IoCs
pid Process 3436 svchost.exe 3436 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.dat tempdir.exe File created C:\Windows\SysWOW64\System64.dll tempdir.exe File created C:\Windows\SysWOW64\KMe.bat tempdir.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tempdir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tempdir.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3188 tempdir.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1892 4424 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 82 PID 4424 wrote to memory of 1892 4424 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 82 PID 4424 wrote to memory of 1892 4424 fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe 82 PID 1892 wrote to memory of 4052 1892 winsmm.exe 83 PID 1892 wrote to memory of 4052 1892 winsmm.exe 83 PID 1892 wrote to memory of 4052 1892 winsmm.exe 83 PID 4052 wrote to memory of 3188 4052 tempdir.exe 84 PID 4052 wrote to memory of 3188 4052 tempdir.exe 84 PID 4052 wrote to memory of 3188 4052 tempdir.exe 84 PID 3188 wrote to memory of 3500 3188 tempdir.exe 56 PID 3188 wrote to memory of 3500 3188 tempdir.exe 56 PID 3188 wrote to memory of 3500 3188 tempdir.exe 56 PID 3188 wrote to memory of 2660 3188 tempdir.exe 86 PID 3188 wrote to memory of 2660 3188 tempdir.exe 86 PID 3188 wrote to memory of 2660 3188 tempdir.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe74e997a5467841f5b915450e9d89e4_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\winsmm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\winsmm.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\tempdir.exeC:\Users\Admin\AppData\Local\Temp\tempdir.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\tempdir.exeC:\Users\Admin\AppData\Local\Temp\tempdir.exe -Nod325⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\KMe.bat6⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netservice1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5c9685a9486c27d37f64fa2521f276d43
SHA13e88a8ada69f5d3b20cec12d731b0b7ecc5c8458
SHA25690a3b7a01912dfdaadaa3cc786fcc18b3837f7330dbb515c295a467db759fe44
SHA51258adc5a80abcfbce73d86f0c9da73e4527a83a2854aa337b14d0c29538e14c2fab32883712664323eef175200e696880b170578d02d5fc625bd8cd7993c07b06
-
Filesize
465KB
MD55e4dda7df4df581270f84feb503c1997
SHA1a625dc8fc1549f6e859bf3d19b2a112728c0b1eb
SHA256916a97987f7171a554de264a8c1786c92d41246073fa8f1a432882466dc125fe
SHA512c890e85ae76602ff23c3a078f3c00a331a8ee8a2c70a624731a34eba278e1b427c1e2e909a904fc278ba2040974be27a5faae36fed59c9e92b951f18280b0cbc
-
Filesize
61B
MD58f3848be53fc40fa7cfceea85e573d16
SHA1f5e07757d091a4549c1b5163d2fa853a0199f55d
SHA256165f6a63e2302b68389779848da0166e5412c53111722885719f616ef5e18b3b
SHA5121ea3b4311bda4032fe5b3e4c1353c654a1d49dc0105f9af5cfee8dedf9ef1a3a1c005e71890bdc87e9ffcee31c4f787ba6f0968cdfc60aa0a7febbca93300577
-
Filesize
162B
MD5c9f55e03623a1ea7f9bcbf13d205e32b
SHA14e9d1f218e21035c4d36fe1b1cb9ca1620dfaabb
SHA256df0e39eedb54ca9eadfd2254e8b263169bc65387be7243a1793afb794c7e0981
SHA5129f5da8106b9ac6cebad0cb67864052a86c044ba3c631bfa742ca9133c1a2f6f79ac3b286b03865ee32ba1089452c9b7fa3e486d1d4390b3586d0e83a5ecd0424
-
Filesize
357KB
MD5a715478f4401f70db0b423b777e6bb1c
SHA16d1ce804cbe10f55147ea5207e9a7a4bf5090c7a
SHA256af04167568ccd9c6700a5f825de9d1a02144cdef1ee651ab2d78c08dbc40a5bb
SHA5120030f6ee04c39bed886d576061f7eb0f6ec60f2d7efd3066c48394b9990161e133d3248ec4ddaa5dcfb6c00de309c9d6e13029a4768acd620dba8cab962b4130