Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 13:32
Behavioral task
behavioral1
Sample
019661958811870f091e8165ba0ade5d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
019661958811870f091e8165ba0ade5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
019661958811870f091e8165ba0ade5d_JaffaCakes118.exe
-
Size
239KB
-
MD5
019661958811870f091e8165ba0ade5d
-
SHA1
7d2d9796de4933aa7cb1997f95951a7bdf6f4862
-
SHA256
ad5084a84f6bfe88af47198af2526b9a7452d87e4aaf205e738888639054cb19
-
SHA512
9fde39f38cbae5e62fe020610348829d96d7a6814bc2240785c2a0b5695617f0c32d1e41bba1456002246c60a8bb5e37ff48ee783e74f9c12eb712348ca8ec37
-
SSDEEP
6144:mwtKD38wkBYK5Tz77uCYXilJbg5O5/9W6:03IYK5/7+XST5lh
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000800000002349f-5.dat aspack_v212_v242 -
Loads dropped DLL 12 IoCs
pid Process 3128 svchost.exe 232 svchost.exe 2752 svchost.exe 1476 svchost.exe 2856 svchost.exe 2468 svchost.exe 3428 svchost.exe 4596 svchost.exe 1696 svchost.exe 4420 svchost.exe 2608 svchost.exe 5016 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SRService.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2068-0-0x00000000002F0000-0x000000000033D000-memory.dmp upx behavioral2/memory/2068-2-0x00000000002F0000-0x000000000033D000-memory.dmp upx behavioral2/memory/2068-1-0x00000000002F0000-0x000000000033D000-memory.dmp upx behavioral2/files/0x000800000002349f-5.dat upx behavioral2/memory/3128-8-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3128-7-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3128-9-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3128-11-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/232-15-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/232-17-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/232-16-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2752-22-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2068-26-0x00000000002F0000-0x000000000033D000-memory.dmp upx behavioral2/memory/1476-30-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/1476-31-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/1476-33-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2856-37-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2856-38-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2856-40-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2468-45-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2468-46-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2468-48-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3428-52-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3428-53-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3428-54-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/3428-56-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4596-60-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4596-61-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4596-63-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/1696-68-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/1696-69-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/1696-70-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4420-75-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4420-76-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/4420-74-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2608-82-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2608-83-0x0000000075940000-0x000000007598D000-memory.dmp upx behavioral2/memory/2608-84-0x0000000075940000-0x000000007598D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2068 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe 2068 019661958811870f091e8165ba0ade5d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\019661958811870f091e8165ba0ade5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\019661958811870f091e8165ba0ade5d_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3128
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:232
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1476
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2856
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3428
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4596
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1696
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4420
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2608
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5b41bb3fb2ad04fd7f8f265a34732a63c
SHA1b2327ced02170bc09c30ce4c65d549cc30cb6fc5
SHA2569f1fd100e85e958d986b211b32f7de931e7411172e4a1155f2ef993de4d4ebbc
SHA512acec814a30b920329a3502f704ab5e16daad4145ece13f0a94866e95dd57cd220d1713599a4d1e686f56a74971a00669db273dffd11be9fee4a882a9e55197c5