Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe
-
Size
141KB
-
MD5
37bc462fa78afb8a95ab08c5060d0cfd
-
SHA1
b529c6b83363460cad9617ed2b477361aae70135
-
SHA256
d58e48dec2d54893ba1d9d161cbc79c059cc9ea0036b18724bd46890af7285ce
-
SHA512
01379f83504750fa64a3af0f6f6b53370ca4cc1c2c4a993eb00c3a166ce0721da57c0cefe88843a5d39773e5f4e809be53c9e26447a6a868c19d88aaa9c0e350
-
SSDEEP
3072:XMq3qCEqUTIzWodffH/oDYfdkyygR7Lxnf41NM:cq3q9bT1oxPwEF3t41+
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe -
Loads dropped DLL 39 IoCs
pid Process 4776 svchost.exe 4776 svchost.exe 4776 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 4292 svchost.exe 4292 svchost.exe 4292 svchost.exe 5112 svchost.exe 5112 svchost.exe 5112 svchost.exe 3668 svchost.exe 3668 svchost.exe 3668 svchost.exe 3816 svchost.exe 3816 svchost.exe 3816 svchost.exe 3816 svchost.exe 3816 svchost.exe 3816 svchost.exe 5100 svchost.exe 5100 svchost.exe 5100 svchost.exe 844 svchost.exe 844 svchost.exe 844 svchost.exe 1844 svchost.exe 1844 svchost.exe 1844 svchost.exe 2212 svchost.exe 2212 svchost.exe 2212 svchost.exe 2064 svchost.exe 2064 svchost.exe 2064 svchost.exe 1196 svchost.exe 1196 svchost.exe 1196 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Irmon.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4352 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe 4352 37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37bc462fa78afb8a95ab08c5060d0cfd_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4776
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2828
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4292
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5112
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3816
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5100
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2212
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2064
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5a0a66930976b99da846ab647b414a5a6
SHA1b0c1e743343f4dbe9cb386f9235ba4c40c3c4a00
SHA256c075d124757d886b1af54c9ffaa1b641f11571826484c9078274a625ac07dbe2
SHA512c2bf9eceae0f09716ce76f04d99c49fe9729f3dc4c5b74580d78324ca63feb0bf1fd08747cb6766d7241a6d82b25a24cb73ca13ece4beb6581261926dec57ab6