Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
15a583e96d384feff390739f59b21356_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15a583e96d384feff390739f59b21356_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15a583e96d384feff390739f59b21356_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
15a583e96d384feff390739f59b21356
-
SHA1
88ae52bd04a892096b998f245eff68ecd6cf3399
-
SHA256
b0980b19fc6da04c4c638310b3921ba4ec50dbf92a687fe84238e17ca3af5790
-
SHA512
99cdc6f4ccee099875a4f7f1e8193f114945179e1b5e0b20398a3f4801b5ffb4c7ba38672f4de5b712e55770967a75d0710e196ce77121be97ba60e953cbb186
-
SSDEEP
24576:d563ey8gZqj4yYAbx5cyLzoy4z5LPrMcs5dmYOYFQn1s97QJv8wBD:P/+qEyYAbzbL0zzJsKJS1QJv8wBD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ lncom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe -
resource yara_rule behavioral2/files/0x0009000000023621-38.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 15a583e96d384feff390739f59b21356_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3924 lncom.exe 4016 fservice.exe 4044 services.exe -
Loads dropped DLL 5 IoCs
pid Process 4044 services.exe 4044 services.exe 4044 services.exe 4016 fservice.exe 3924 lncom.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ lncom.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\lncom_.jpg 15a583e96d384feff390739f59b21356_JaffaCakes118.exe File created C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe lncom.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\lncom.exe.bat lncom.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\lncom.exe 15a583e96d384feff390739f59b21356_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000800000002361f-5.dat upx behavioral2/memory/3924-14-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4016-26-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-36-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4016-54-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/3924-56-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-58-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-59-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-61-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-63-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-65-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-67-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-69-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-71-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-73-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-75-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-77-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-79-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-81-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-83-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/4044-85-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe lncom.exe File opened for modification C:\Windows\system\sservice.exe lncom.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lncom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15a583e96d384feff390739f59b21356_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe 4044 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4044 services.exe 4044 services.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 872 wrote to memory of 3924 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 89 PID 872 wrote to memory of 3924 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 89 PID 872 wrote to memory of 3924 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 89 PID 872 wrote to memory of 3716 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 90 PID 872 wrote to memory of 3716 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 90 PID 872 wrote to memory of 3716 872 15a583e96d384feff390739f59b21356_JaffaCakes118.exe 90 PID 3924 wrote to memory of 4016 3924 lncom.exe 92 PID 3924 wrote to memory of 4016 3924 lncom.exe 92 PID 3924 wrote to memory of 4016 3924 lncom.exe 92 PID 4016 wrote to memory of 4044 4016 fservice.exe 93 PID 4016 wrote to memory of 4044 4016 fservice.exe 93 PID 4016 wrote to memory of 4044 4016 fservice.exe 93 PID 4044 wrote to memory of 3236 4044 services.exe 94 PID 4044 wrote to memory of 3236 4044 services.exe 94 PID 4044 wrote to memory of 3236 4044 services.exe 94 PID 4044 wrote to memory of 2920 4044 services.exe 95 PID 4044 wrote to memory of 2920 4044 services.exe 95 PID 4044 wrote to memory of 2920 4044 services.exe 95 PID 3924 wrote to memory of 4548 3924 lncom.exe 98 PID 3924 wrote to memory of 4548 3924 lncom.exe 98 PID 3924 wrote to memory of 4548 3924 lncom.exe 98 PID 2920 wrote to memory of 4248 2920 NET.exe 100 PID 2920 wrote to memory of 4248 2920 NET.exe 100 PID 2920 wrote to memory of 4248 2920 NET.exe 100 PID 3236 wrote to memory of 1672 3236 NET.exe 101 PID 3236 wrote to memory of 1672 3236 NET.exe 101 PID 3236 wrote to memory of 1672 3236 NET.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a583e96d384feff390739f59b21356_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15a583e96d384feff390739f59b21356_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\lncom.exe"C:\Windows\system32\lncom.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\lncom.exe.bat3⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\15A583~1.EXE.bat2⤵
- System Location Discovery: System Language Discovery
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD5f4ddf29eaf0c5c43766f04e252be4e3c
SHA1191906c4789b30d136eec302a83d5b20b865ad68
SHA256800e5c7b58fb7a62daa23b9097ac629d343bd1215b06065cf6244f0aea68ab2c
SHA512f96a8bf48c74d74a60ae30917c54e576ef341f2a1a3271f2bce7be31b7d352a8bafc1a3e2ed634e9f1e56c5db7a25265f18501172d14a53b05cbef164cc1c5fc
-
Filesize
342KB
MD5ac89f205bb46d673c1bdf8ab5f262d96
SHA1991f4c6679c8679b762fe002695242589cb8d6b5
SHA2567e14e8676889e9246134fed41dd7e02a6a3bb279469b91dce7ec8038e535b02a
SHA5129d0fe91f76ba62fca93d8f7f8736327750465e8f7a7fa39cadf39b66a0cf2078c8c6f2ac32a452421f83141efa80d41c9979a525c358c2e18c77081bc79ae7f7
-
Filesize
99B
MD51f73e450d92934cd37c041eb3f1ff51f
SHA1f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0
SHA2563a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e
SHA5125f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5
-
Filesize
858KB
MD5076e3caed758a1c18c91a0e9cae3368f
SHA1f5f8ad26819a471318d24631fa5055036712a87e
SHA256954f7d96502b5c5fe2e98a5045bca7f5e9ba11e3dbf92a5c0214a6aa4c7f2208
SHA5127b8b9adf2dc67871b06fb9094bcd81e8834643cd9af96a0af591c2978bbe2fb7f53ff9b54ae09099aed97db727cd42df4ef02662ef4c6d7cf8023561ddccc7f2
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066