Analysis
-
max time kernel
107s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe
-
Size
701.5MB
-
MD5
49a4a1de5be4bd6e07cde60123841b4c
-
SHA1
97af4fbcb4153c704641214b47aaf6214bebb15c
-
SHA256
dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd
-
SHA512
a44989777718f8e49f6df8b3c0f07f403d14b9aa278b5408e62c9b62d392d055895bfa37a69a013898dba59d71a7de661c546e344c4f315887f06184e0ce1632
-
SSDEEP
98304:kfMKt+zSwDjgFrEiAmeDbM+SOUxRpASfPKH4T:k0fPkgLE+0DA/H4T
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Executes dropped EXE 1 IoCs
pid Process 4832 client32.exe -
Loads dropped DLL 6 IoCs
pid Process 4832 client32.exe 4832 client32.exe 4832 client32.exe 4832 client32.exe 4832 client32.exe 4832 client32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetSupport = "C:\\Users\\Admin\\AppData\\Roaming\\WinSupportS_v_3.6418\\client32.exe" JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4832 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4832 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 4832 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 98 PID 1156 wrote to memory of 4832 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 98 PID 1156 wrote to memory of 4832 1156 JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dccce1884e1a784560d8e82564173ae49f9ece2e1e9735e2077a7e76d341f9dd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.exe"C:\Users\Admin\AppData\Roaming\WinSupportS_v_3.6418\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD53221ee3663e993e1ed63eaea1e2aa8e7
SHA1a010f49766248e54e2aecaca75a96f522e7da42a
SHA2563b715dc221ffe5eaf4f3bac692a3c9c557005acec8e2ca634535043b2e319065
SHA512644c6dad5db5a0e9da6cf3c195fd03bcdb5be4b1611546909ff6ab860a251330353f7ece0bed7c81b3d832301fa3a00efc8a132000bdbb61b4bf6efbde788ce1
-
Filesize
755KB
MD58ef2222d8ce5d2c6db41e0baa9dfba5d
SHA1a38332fce037720a0d4f4b2add6fa887f075b0f4
SHA2568f0eebe3056a4fc69206e4923dc6e4500174b64e852313a16dbf6dd39d232f5f
SHA51243e662a085daeabf40da73a1bea3aeb0a0775b490a5bd1adb752b81998e699dc32e5e9343e516d3e9ecd480688f5b6e774962ad2d79ea315f5df252b6838e8f1
-
Filesize
258B
MD51b41e64c60ca9dfadeb063cd822ab089
SHA1abfcd51bb120a7eae5bbd9a99624e4abe0c9139d
SHA256f4e2f28169e0c88b2551b6f1d63f8ba513feb15beacc43a82f626b93d673f56d
SHA512c97e0eabea62302a4cfef974ac309f3498505dd055ba74133ee2462e215b3ebc5c647e11bcbac1246b9f750b5d09240ca08a6b617a7007f2fa955f6b6dd7fee4
-
Filesize
18KB
MD54144431d471b39404bc97d55a23ff038
SHA1c1aea75636930dec35ce4207a78c6677a765877f
SHA256744e33fe5b1993452edc8e3ff5f95c119b640e05b4a2e4f8951b30bf8503a9ec
SHA51205cf53bc65d78299e474feb28a34efb96ffead23dcd39f8f13310d376722b6a73e6c8311ae5372ea615d64ba1e749cd6cbf9061efe52bf6895ca91d2f2d406c0
-
Filesize
3.6MB
MD57420623b672b6f41a9b9233131c0f57c
SHA1f8f939ff198d871c096bddcb396acaeb07474a68
SHA256e628f5f3c112f627daf60d4d787677c3b46cf378ac3e874642e80e9d458144ff
SHA5124f5b6d6163cb246009a6a12554520aebe7085ceab96e5065862cc6be39fa83f03792bf6763de2315c2944ce27deb7f4b366e5b07fb93d6d819700d15685a2d6d
-
Filesize
103KB
MD5a571b16d5b88e4b185fc7f62717d528d
SHA1e39fe79083a7d30a873497852867f0a5fda9a198
SHA256abb915e58b09b4b7e233c8337692bc9401c59a6fba94999ef6a143dea56d6588
SHA512121d771a3b51badadfb75cae9d6e6f3064563b79a601a0fdba61d1280a8c2646529e5cf705ba8076f703b88b355c0dd07b98091ad7fdf8ed33cca4e075e41c17
-
Filesize
914B
MD5fd8286ae0a78720863b527ef40afa2d2
SHA1cde55878b3f1f296548d2548a2f3cc0170afa67e
SHA256b3c4963e4a5dbe7af6ad552526f58eff57c3f3868fde42416501643c95e938c0
SHA512a75c53132a825635491fa9f5e5bbdc1201f505d4caf78ab56eedacb1cd9d2358af27c0f48ae548fe261dc26f4b68960abf8d950d26c747290c6cbd44297670c6
-
Filesize
32KB
MD538af07ea16434b34cb031d14c4ff2bf9
SHA1abd3d16d409c476d06ee278ec811f634b637eee6
SHA256ee6e92c7e6fcc13311e3995cfa67dc014313eaf84fdf7f77e433842b0e7fb181
SHA51208660595b472b7ae07c7028d62abf35ff8c7f4773d51857137c709ebe17f0a60fb194bec48cc6f929131d2e04a949ed25fe30b81a4efa5d489f9edd7f0f45b9e