Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe
-
Size
72KB
-
MD5
2f65c0f7587d113d0fe97d10e3847882
-
SHA1
f97e61b40fc7e6b001d45fb7d44fda689d05529b
-
SHA256
0dd8a1d3f0c5f4d42680eb46c85b47f74f3f0b20801fe969a9b73420e2e8904d
-
SHA512
7e30eec8c0e9310b62e0697eafe161339b9cca2f5b4e7a3e684c1f6323d0638598296466bbb77b1a7ce8e817c35938767972d026ab447ae41d82461a380253b3
-
SSDEEP
1536:Iid9QmncCR3QTt839OFo84X5Mk/oj7WDdNfsuhGnnnnnnnrt:I6Qa3ut8NRrXhoj7O2t
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\e578b48\Parameters\ServiceDll = "C:\\Windows\\system32\\e578b48.dll" 2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 1468 svchost.exe 1468 svchost.exe 1468 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\e578b48.dll 2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimage.dat 2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msimage.dat svchost.exe File opened for modification C:\Windows\SysWOW64\fi.txt svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 968 2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f65c0f7587d113d0fe97d10e3847882_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:968
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "e578b48"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5029c751f6df556ba8253de55c3294f6a
SHA1da73deb150f093576f9227a3bbe5f70d090e57bc
SHA256d7681fcf80a5b7a5a8296fcc74ed37c917a9343a594b45d7165a207e81a8a772
SHA512b31c15f093e0cc5abfda72c145e877d628e3b28c2f9a853dedd4502e56f8e11c1f06d2fbe35760012fb7936adbef4094e558d38bf1873e79658266e1b14a5280
-
Filesize
64KB
MD578e30a9d732ac12fc91fa494596d6286
SHA1b30239269a66bd9a9a462e279713c550e5f4aafe
SHA25655149cc3b22f3ffdc2c20b445ebd54120509065f9b52605c00fa66a5baa6850b
SHA5120fd9b30018dfb2275f4cf72db2858242cd09c8baee19a272834e16a15845ebfde7b48ccd8e506b0a0a6f602e9a3e1ad2e342276968f927d9104b96633452e9a3
-
Filesize
10KB
MD5a0a8568d96319bf48c4e5dd6dfde1138
SHA1e0c018d32f0020cffffef75fd5f46527a426e115
SHA2569db133aaa9f0c6b2a953102a8876f359b281dc8b26151f5866f4e4792ea391b2
SHA512672aa7ffb2cea55f0a57c695db31026e5db38df6fbed4909ac33fe6f5eb1f4549d39f7ffe1c33458dd97cfff965917dc025af394f6e43529497816846ab869c8