Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe
-
Size
57KB
-
MD5
0bfbc9eb9115755eaa40d0c21d107244
-
SHA1
38e6b0a27763cb5c46164660f10f6df1e4801e9e
-
SHA256
0a04f4841fa1ac63af0fd7e72353faa4b09ded3577510255dea572a357517de9
-
SHA512
8e6fe5256520370b99286198ac96c5fac20564a421458aecb5896d039db00da72b57dddc55e0f2cdd8bc7a9397d5e4f8b184b352f9652fbc8dfb0bc79c13ff1b
-
SSDEEP
768:7Qyy1uehE54M6mDVwihlHgdcHk7NzziqBj1+4fbCCXVz8iiom+ZfzNGwkty6+/P:MysuehEmm1rYyqCgat+dVktyz/P
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zfmnpz\parameters\ServiceDll = "%SystemRoot%\\System32\\vvxjbm.dll" 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\zfmnpz\parameters\ServiceDll = "%SystemRoot%\\System32\\vvxjbm.dll" 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\zfmnpz\parameters\ServiceDll = "%SystemRoot%\\System32\\vvxjbm.dll" 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000018c34-5.dat aspack_v212_v242 -
Loads dropped DLL 3 IoCs
pid Process 1756 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe 2284 svchost.exe 2284 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\00052cf0.ini 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe File created C:\Windows\SysWOW64\vvxjbm.dll 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bfbc9eb9115755eaa40d0c21d107244_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1756
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k zfmnpz1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51864db1e92a86337fd93a35627b7a709
SHA12d618d37122a1604c7ec49ba4df2d8a5c2ccf1cb
SHA256522af282e7c8a5b009b7aa73e61f7a75e2ec95603bda98525ef426982f8071ba
SHA51267b83fd5cf4d373c45dbe1c7b85ffb36f05747783d101959f2349da7913ea8884f69a5a3f7085539b95c41003140c346c04755cc8afc134914ea5c1afa6c4c50