Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe
-
Size
6.2MB
-
MD5
6252d21392e1917e0f3dceda06e3a995
-
SHA1
62fb2c2db8e172106d59a53ac1c5a3c2f67169f4
-
SHA256
d23d434b7c1f74517ebc2af362052adcb48344b9e55f64a4183883ed78b67b2d
-
SHA512
a136098f4c5fd18bcdb7c776ac23826f7daf4aa855a31c33ea122c607c564f4154c371adf964ea14e2381cd01a8dac78ca48a4aac8645d9672e31584d1b6e8b6
-
SSDEEP
98304:bh29rRyP4k6SnGbXeEmn42PlEbp2WWBJySiiusHTjB+DidXvh6d204OOR5qS:89EDQXeEz2t2mBvHTjOgJ6M8YY
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
PlotterLib.exePlotManage.exePlotterLib.tmpWCL.exesvschost.exepid Process 3456 PlotterLib.exe 4796 PlotManage.exe 2444 PlotterLib.tmp 3480 WCL.exe 3452 svschost.exe -
Loads dropped DLL 6 IoCs
Processes:
svschost.exepid Process 3452 svschost.exe 3452 svschost.exe 3452 svschost.exe 3452 svschost.exe 3452 svschost.exe 3452 svschost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PlotterLib.exePlotManage.exePlotterLib.tmpsvschost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlotterLib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlotManage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlotterLib.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svschost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PlotterLib.tmppid Process 2444 PlotterLib.tmp 2444 PlotterLib.tmp -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exesvschost.exePlotManage.exedescription pid Process Token: SeDebugPrivilege 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe Token: SeSecurityPrivilege 3452 svschost.exe Token: SeDebugPrivilege 4796 PlotManage.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
PlotterLib.tmpsvschost.exepid Process 2444 PlotterLib.tmp 3452 svschost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.execmd.exePlotterLib.exePlotterLib.tmpdescription pid Process procid_target PID 5052 wrote to memory of 3456 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 84 PID 5052 wrote to memory of 3456 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 84 PID 5052 wrote to memory of 3456 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 84 PID 5052 wrote to memory of 4796 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 86 PID 5052 wrote to memory of 4796 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 86 PID 5052 wrote to memory of 4796 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 86 PID 5052 wrote to memory of 1960 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 87 PID 5052 wrote to memory of 1960 5052 6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe 87 PID 1960 wrote to memory of 64 1960 cmd.exe 89 PID 1960 wrote to memory of 64 1960 cmd.exe 89 PID 3456 wrote to memory of 2444 3456 PlotterLib.exe 90 PID 3456 wrote to memory of 2444 3456 PlotterLib.exe 90 PID 3456 wrote to memory of 2444 3456 PlotterLib.exe 90 PID 2444 wrote to memory of 3480 2444 PlotterLib.tmp 92 PID 2444 wrote to memory of 3480 2444 PlotterLib.tmp 92 PID 2444 wrote to memory of 3452 2444 PlotterLib.tmp 93 PID 2444 wrote to memory of 3452 2444 PlotterLib.tmp 93 PID 2444 wrote to memory of 3452 2444 PlotterLib.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe" /VERYSILENT /SP-2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\is-UKSG6.tmp\PlotterLib.tmp"C:\Users\Admin\AppData\Local\Temp\is-UKSG6.tmp\PlotterLib.tmp" /SL5="$60250,2331902,780800,C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PlotterLib.exe" /VERYSILENT /SP-3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\WinSpo\WCL.exe"C:\Users\Admin\AppData\Roaming\WinSpo\WCL.exe"4⤵
- Executes dropped EXE
PID:3480
-
-
C:\Users\Admin\AppData\Roaming\WinSpo\svschost.exe"C:\Users\Admin\AppData\Roaming\WinSpo\svschost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PlotManage.exe"C:\Users\Admin\AppData\Local\Temp\PlotManage.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 &Del "6252d21392e1917e0f3dceda06e3a995_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 13⤵PID:64
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD56cf6e85c530e2f6d6e28aa066b19c29b
SHA1679cd8304321ab4615793fa24449163fa044fe28
SHA256760dbaef1a097bda49db17342e2bf27c334e3358a515dd53445b55cb01629a31
SHA51208ba349dbba2fc7d0117d3422a66505c166b82b8f3ceff78e7ff1799f6cba1a71a275ea8d7ac9d326cd88528124f5820c7abc3ce01d48828394ad5b9276fbd8b
-
Filesize
3.0MB
MD5725506d889dc290b57abee789f86d09e
SHA16239c0862a57a4a1859099a1fc6e70c52f3ee80e
SHA256b61c57ff173e99dc83c2b4c300072d2b98f86271202ec05f5c94fbf218839507
SHA51263a9f5a3f2f5d996a729cb0863ecf73aab4da047ef297483809113e367151974f8c27f958cd3ae867a179b2cdd4ecb6e4554fa649a395444d5f6226f5bf0ca4a
-
Filesize
2.9MB
MD5669dc6230c96d8f4e1a831554f655427
SHA191e57ce09970cba73e638d60ef2faf8bd6aa39ba
SHA25635a088a72be2d2aa9c8f2285fbcabb5893582d6bc2dd355b107da081c999db82
SHA5124c6e4033b4287ba8efe3c1843dff0f2498e0ac53ee5993ad51a13879fb32ae65cc146cf25c1c716722c9b6b5affc6a1055939486a5ea2d46f4dfa8809b6489b8
-
Filesize
6KB
MD588b1dab8f4fd1ae879685995c90bd902
SHA13d23fb4036dc17fa4bee27e3e2a56ff49beed59d
SHA25660fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92
SHA5124ea2c20991189fe1d6d5c700603c038406303cca594577ddcbc16ab9a7915cb4d4aa9e53093747db164f068a7ba0f568424bc8cb7682f1a3fb17e4c9ec01f047
-
Filesize
90KB
MD502b71d7f1eff7aa74b19969b4d2741b9
SHA18d625c3932b12859268149fa936ee6f607d03a65
SHA2561774899128785abd6015c995316ea2adf26caaaf51825c290b1caf39ad91f5a7
SHA5129092fec5f21f83bf4973d001662e73547c1b4b1cec0a1e55242ddfdca62706b885bb22f0d02b287c9e09641fbe6812cabfe16aa6d881705648cc847856522257
-
Filesize
3.6MB
MD521e49d937a929db0ff9c265e8b2b6777
SHA188000b29bb69b3e8a29f30f0274de3e71a8b7ef7
SHA2569b760f2aa4576d044bcd33e21943a8cbccd9c56d17d598fa509213e05f9939c1
SHA512165664b4d3b6aa2c481665a9aed572a7445cd32052066faf7bf05340820d8afc3cf4660a344d2a06e6f3bcabbfa7923eb61c39b7367735ede0f5154f9696d1bf
-
Filesize
386KB
MD54ae68042d513cba160cdaafe45d35582
SHA19a07ebd26fab57947b20647ac6ca0019475ffb44
SHA256cc2b02ac7ed7656e4d26574367c571dfc44d3f167838f0ee868cdb8b493b3ff4
SHA512b78f80697ba16c33ba9ede2d2019ceb6173c8a2d335d6990b75613c1af21669f25ea8f2d0e3c56af08578d038cf3b66ca4e55ca252ad699a805598993a3d5be8
-
Filesize
706B
MD5812452fb7d6044657f21868f8b046ec8
SHA12a3d0cfa5ef48c687ed42c101c3466b8104379bf
SHA2563a0fcc3de6f38f43bc68c3f7733470c5ae0ba7e44231f381a555c26f72cded2d
SHA512ff72c6f6e830a34bcb84f44030568b709b422868d93a7ad0c12a2da1d7e1fdee6e048e23b90d87a0d98383d3964ab71d28db98f58ad381c93c06682ae1b4ec36
-
Filesize
319KB
MD5bf9dd864f5822dc28ffce9529bae15ba
SHA1ee578ba78ddaf0547edd23355dbc658cdc1b86ab
SHA25674328f7f2d08cfc734cc5151bc68377962d1e0a75137908925a604b3d18b7be6
SHA512ea00797c9e7117452e3a7f94db016e22dad0246c439daaae304ecfb5c5de19d2db0c63ce1edd135a409f07ba75b19bd6428a7ab6d80a9dc65ff473ff985ef43e
-
Filesize
6KB
MD50e486de290c0948cc69b74c1e1a8a8a0
SHA17cb150504196a8cb028f4ec23566cc0760fc72aa
SHA25683db250a9a3ea0600dcdd18626b1069701731b99d39207822be8ccd72d311ef5
SHA512e175d67da17523177deda8c4e77f213487956bf1783e3a2b576a6918572702343fbec7717711545410e4459aea2bd9a4a455365bba8a0d7afc07a0e47c35a250
-
Filesize
328B
MD526e28c01461f7e65c402bdf09923d435
SHA11d9b5cfcc30436112a7e31d5e4624f52e845c573
SHA256d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368
SHA512c30ec66fecb0a41e91a31804be3a8b6047fc3789306adc106c723b3e5b166127766670c7da38d77d3694d99a8cddb26bc266ee21dba60a148cdf4d6ee10d27d7
-
Filesize
759KB
MD57aa3e993ffef3a554ebab6532eac4075
SHA192b541293c63a4fb343327a1cc7708f96e7eec74
SHA256aaf5bd6cdf7eae9d3ed153033917b3aed750d48ab11222569246db162d94b72e
SHA51297d91945d2f90594505ce67e2ce6f9bf4cfabe7ec5a0461ac5bf82c8bd1094308c99a02d4cc25276dc9701c8109afe1f69726964f2e06dce98f005f0e8f5ec49
-
Filesize
59KB
MD51239f15c699caece7ae3b5d2d5cbe312
SHA13655b2fb3b1f94f2ca670c397d2b1d3b3f44c47e
SHA256545e90e66968c26722b23a4cd67d1039027b60fc33a33d669a6de73dd5e6a0af
SHA512ad0b98ce5633f8d42ead9719420481e9cb0ea0ee6bd38f660261e180425befd4bd7e7acace466c1e15e277b4d48274d0b480a92709529ae901f50e1a77a2f236
-
Filesize
85KB
MD508b0d2ee1c48e37aa2560cb5c1a327e0
SHA1ea22db9932ba94b3775d3f3c5b07d451ab6105b1
SHA256a199c6653726ba9e0cb9178af9691926c08667d451a3154b5966b2f22c24a64e
SHA512785cb3a9ef2cce6afcc86f4d5205c14114040e89c4a9d6091dd9135be69fb62f58c1a0dc0657361c3c5bb3b1d94bf7a019c37fe20c2e53cf7814952fd43d9a67
-
Filesize
259B
MD5ac5d5cc9acad4531ef1bd16145ea68bd
SHA1f9d92f79a934815b645591ebbd6f5d20aa6a3e38
SHA25668c787616681427557343e42ede5805dfbeeb580c59f69c4706b500f225e2c6b
SHA512196863e039e9c83fb0f8eb3f0a6119db31a624e7ef4e9ba99516702e76796957f0ebf87e8728e1bd0de6cd7420bec6e644caa58a0724a7208e9a765d6eb78f64
-
Filesize
17KB
MD5018b7364f4de19d99c37665eb8555fc5
SHA1661d32b263131f27c890a3a17e3a7f58b0035f93
SHA256fb68bf34ae44c30267e5034d65e7d917033631f8290a17de264de5189f1c9e71
SHA51282eb86e58894d3beed9f7efefdd9f8ece4d4d1af7d95e8751054eac18ff8eb08e6bfdd0ccf132f666b2bdd47669fdc4b1fcf4c172a4cf3f25b0464e6943489f8
-
Filesize
46B
MD53be27483fdcdbf9ebae93234785235e3
SHA1360b61fe19cdc1afb2b34d8c25d8b88a4c843a82
SHA2564bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b
SHA512edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5
-
Filesize
31KB
MD5191bd0cc859e47aaa7c5195f58f56d4e
SHA1c2d91b7688ab3d4fbc08dc8df895323ca2c47460
SHA2563d30caf999bbd1c39b681f4782c2f703c02b9956c4a77d7d531e20ca02ffaa29
SHA5129c876afdc1b3cab2c01d1d369d6c532edc4377876ed95f324e0e638860852d41052796a16f7314ef922bb7ff6edb9f3687f6edfb342b6524951906340c614b08