Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe
-
Size
76KB
-
MD5
1048e08c6e262d14dce46efb179f5b1a
-
SHA1
36b6665192c057681d8f62c792acf29a0beabf13
-
SHA256
a84a292b5d1b581da70f4a59139cadaa5fb057d404586da7068f1ae5be393eb6
-
SHA512
c0937adb7984ce3c0afc531676cb86e0d0c3306345a8f483cdff5d1d7b2bbb23196e16027a0fa697a14e2201832dfcd7974818dfda9f2e826dd149a74a4a717c
-
SSDEEP
1536:VP6CN+iMRMuFnToIfGNvxQQvJ0ehEdfDYsvYBRaAosy:VP6CN+iMntTBfGSYsvYBEA+
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\+viSpteLPcrt\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Roaming\\xvrmdjx.cc3" 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe 1476 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe 1476 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 528 wrote to memory of 2964 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe 32 PID 528 wrote to memory of 2964 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe 32 PID 528 wrote to memory of 2964 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe 32 PID 528 wrote to memory of 2964 528 1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1048e08c6e262d14dce46efb179f5b1a_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1048E0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:2944
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30.2MB
MD5a831b7aeebc662e4318ea23f723361a0
SHA1994ffc12668fc9db0f175986908f6512100bd34e
SHA256046e5ed5e05674cb59da330fbc6337fc083f036c74d12097b6d512e3bfcddfb2
SHA5126100ffd7254d09880981626b1bac380e2d081215c7e342ec6520cadf91b6183a8050e1760d657751873c189a8044cb1b563b7eec7c08bed1f9e7fcc1968eb26c