Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
be462f9e2361006b4463e61041b77ff4
-
SHA1
f53e3052dba745a1218c44de0f6018cae378dc9f
-
SHA256
c00b4815694f13db6da7166df017846a456b8fa53db78d9960cd6f37e743122f
-
SHA512
9c386eafeb8bacee84a1552a87eaf9efdad0041fd5d16d41d7fac6b65ecebfa5dc419ce47021874ceadf819de46ce99e33b7d723ae36dbc45a6fe9da2d98ded7
-
SSDEEP
24576:L6xqzBBycNHDy/SkXD8S7JWWZS1VfuN4C3cC9shRc/WGXcrrH:9f59sXD37JpsVkshOkH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "0" be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe -
Executes dropped EXE 10 IoCs
pid Process 2216 wow64main.exe 4480 wscsvc32.exe 1244 wscsvc32.exe 4684 wscsvc32.exe 3512 wscsvc32.exe 2928 wscsvc32.exe 4552 wscsvc32.exe 4788 wscsvc32.exe 4612 wscsvc32.exe 4564 wscsvc32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "0" be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wow64main.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wow64main.exe" be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3492 sc.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 404 4480 WerFault.exe 102 3112 1244 WerFault.exe 109 1116 4684 WerFault.exe 113 892 3512 WerFault.exe 116 1648 2928 WerFault.exe 120 4556 4552 WerFault.exe 123 4976 4788 WerFault.exe 126 1680 4612 WerFault.exe 129 2872 4564 WerFault.exe 132 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wow64main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe 2216 wow64main.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4480 wscsvc32.exe 1244 wscsvc32.exe 4684 wscsvc32.exe 3512 wscsvc32.exe 2928 wscsvc32.exe 4552 wscsvc32.exe 4788 wscsvc32.exe 4612 wscsvc32.exe 4564 wscsvc32.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3600 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 83 PID 4736 wrote to memory of 3600 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 83 PID 4736 wrote to memory of 3600 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 83 PID 4736 wrote to memory of 3492 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3492 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3492 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 84 PID 4736 wrote to memory of 2216 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 87 PID 4736 wrote to memory of 2216 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 87 PID 4736 wrote to memory of 2216 4736 be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe 87 PID 3600 wrote to memory of 1580 3600 net.exe 88 PID 3600 wrote to memory of 1580 3600 net.exe 88 PID 3600 wrote to memory of 1580 3600 net.exe 88 PID 2216 wrote to memory of 4480 2216 wow64main.exe 102 PID 2216 wrote to memory of 4480 2216 wow64main.exe 102 PID 2216 wrote to memory of 4480 2216 wow64main.exe 102 PID 2216 wrote to memory of 1244 2216 wow64main.exe 109 PID 2216 wrote to memory of 1244 2216 wow64main.exe 109 PID 2216 wrote to memory of 1244 2216 wow64main.exe 109 PID 2216 wrote to memory of 4684 2216 wow64main.exe 113 PID 2216 wrote to memory of 4684 2216 wow64main.exe 113 PID 2216 wrote to memory of 4684 2216 wow64main.exe 113 PID 2216 wrote to memory of 3512 2216 wow64main.exe 116 PID 2216 wrote to memory of 3512 2216 wow64main.exe 116 PID 2216 wrote to memory of 3512 2216 wow64main.exe 116 PID 2216 wrote to memory of 2928 2216 wow64main.exe 120 PID 2216 wrote to memory of 2928 2216 wow64main.exe 120 PID 2216 wrote to memory of 2928 2216 wow64main.exe 120 PID 2216 wrote to memory of 4552 2216 wow64main.exe 123 PID 2216 wrote to memory of 4552 2216 wow64main.exe 123 PID 2216 wrote to memory of 4552 2216 wow64main.exe 123 PID 2216 wrote to memory of 4788 2216 wow64main.exe 126 PID 2216 wrote to memory of 4788 2216 wow64main.exe 126 PID 2216 wrote to memory of 4788 2216 wow64main.exe 126 PID 2216 wrote to memory of 4612 2216 wow64main.exe 129 PID 2216 wrote to memory of 4612 2216 wow64main.exe 129 PID 2216 wrote to memory of 4612 2216 wow64main.exe 129 PID 2216 wrote to memory of 4564 2216 wow64main.exe 132 PID 2216 wrote to memory of 4564 2216 wow64main.exe 132 PID 2216 wrote to memory of 4564 2216 wow64main.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be462f9e2361006b4463e61041b77ff4_JaffaCakes118.exe"1⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\wow64main.exeC:\Users\Admin\AppData\Local\Temp\wow64main.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 5724⤵
- Program crash
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 5364⤵
- Program crash
PID:3112
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 5364⤵
- Program crash
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 5364⤵
- Program crash
PID:892
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 5364⤵
- Program crash
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 5364⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 5364⤵
- Program crash
PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 5364⤵
- Program crash
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 5364⤵
- Program crash
PID:2872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4480 -ip 44801⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1244 -ip 12441⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4684 -ip 46841⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3512 -ip 35121⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2928 -ip 29281⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4788 -ip 47881⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4612 -ip 46121⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4564 -ip 45641⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5be462f9e2361006b4463e61041b77ff4
SHA1f53e3052dba745a1218c44de0f6018cae378dc9f
SHA256c00b4815694f13db6da7166df017846a456b8fa53db78d9960cd6f37e743122f
SHA5129c386eafeb8bacee84a1552a87eaf9efdad0041fd5d16d41d7fac6b65ecebfa5dc419ce47021874ceadf819de46ce99e33b7d723ae36dbc45a6fe9da2d98ded7
-
Filesize
988KB
MD5ffc173f1074393e477ed6b380c55aa1a
SHA12b9399ea6910afd5206f67e6ee59806304d3337b
SHA2568c6dd66896908f43f7015f555acf048fba04d537204f67c17e26b68605d85724
SHA5129adc659181b0374654c88fbe6f52c0cf81154ea14b0bb0ea013db443e381c50352c5a07487d6191ae4066758a09e3e2d3831397a492ae195ff4a037741d3199a