Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe
-
Size
2.1MB
-
MD5
fe5b9802204418aa5238c4d2a16d799c
-
SHA1
eaf47425d900150ceb5f0e88e5e7d08e4634bb20
-
SHA256
0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23
-
SHA512
98d6aa61d479adec304b63b9fb07e611767f7f27d3fb2cf267895264100d6d2c4cde92803be9a9216990df9962ebdf84eb39986da7115b36742837300e14707d
-
SSDEEP
49152:/RmS6Vx3F1rSdZ/ufvr7TE22qqpE+OVbbI3TyqxNoJ4vhxPXSn:/RTy3PWd9ufD+B07rJYLE
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.lnk JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe -
Executes dropped EXE 1 IoCs
pid Process 4884 client32.exe -
Loads dropped DLL 7 IoCs
pid Process 4884 client32.exe 4884 client32.exe 4884 client32.exe 4884 client32.exe 4884 client32.exe 4884 client32.exe 4884 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4884 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4884 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 516 wrote to memory of 4884 516 JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe 84 PID 516 wrote to memory of 4884 516 JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe 84 PID 516 wrote to memory of 4884 516 JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f170f04c03a6aeb1b60fc29b053fcc981de9229f0aa60ddf7988d3bb3167c23.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\CodeIntegrity\WinSupport\client32.exe"C:\Users\Admin\AppData\Roaming\CodeIntegrity\WinSupport\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
254B
MD58614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
387KB
MD5eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
Filesize
104KB
MD5f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
Filesize
780B
MD5f189c9be825c43e7bc601616fc7654c4
SHA12912ceca2bc00bfed6679ef7771eb60ab870126f
SHA2566cc0d580dc462d27b45b7c86c830e164dd63c72907f17413a1bf5493478990c7
SHA512423f8df5ab9c52e4209eae7d6ca9532233f12ff4f52d9cf9aa8fcf56e2231259b863d7f08bb3d5884864f060de3e4820ad72f28d616e771582000c4bb9f766c3
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd