Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
ff1241d0785671407782c6947f71439c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff1241d0785671407782c6947f71439c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff1241d0785671407782c6947f71439c_JaffaCakes118.exe
-
Size
65KB
-
MD5
ff1241d0785671407782c6947f71439c
-
SHA1
8050f381232a9419e6f80f04321a6003e55dec6d
-
SHA256
b61b15f4ed1fbd885cf5c0cec10bf74b01f134775fbcd3c494359c9da2758190
-
SHA512
710e49950fa3dacae6975cc2d0dac07fdf6e813c1644761292ac85fed9e1c4b12df3d34f526bbd16b4f2d9e0a2e2041d9fdf12081e5ef68c04a6b261e151ac6c
-
SSDEEP
1536:c4+dpcjwudd0OZPqB/VGJaAx8tglyA0yURwR:c4+dpcjwujDUB5Amg4Jy/R
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\thuqpl.sys ff1241d0785671407782c6947f71439c_JaffaCakes118.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hrogtz\Parameters\ServiceDll = "%SystemRoot%\\System32\\thuqpl.dll" ff1241d0785671407782c6947f71439c_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2264 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 ff1241d0785671407782c6947f71439c_JaffaCakes118.exe 2264 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\00047fb0.001 ff1241d0785671407782c6947f71439c_JaffaCakes118.exe File created C:\Windows\SysWOW64\thuqpl.dll ff1241d0785671407782c6947f71439c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff1241d0785671407782c6947f71439c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff1241d0785671407782c6947f71439c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff1241d0785671407782c6947f71439c_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2016
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k hrogtz1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5771c916bd288c0fe71376cbc9bb261e6
SHA1d547ee68ad12090b54eabefaee0f80aea650c2c0
SHA256266004e3ca59822a18f128300f66c5ac47af5852aafb26ce78d493f5ad032737
SHA512efdd2ceadf3d6160b09b5617b080a2e83bb08169fd24aa0e5228a27bd2b015cbfa39121e4b8517e4d1719350f0a54b3c6cf1a5055855962f493d14113b8e5b40