Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:03
Behavioral task
behavioral1
Sample
JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe
-
Size
32KB
-
MD5
e26a83887c83a6078bbd5984cfd4b35e
-
SHA1
851b8a33f38e6ec95f6e4709e2e36d15e227afd7
-
SHA256
4c75baeaeae732be06d8de4bf0903037b222fd9b512313590ab15f8379eff32f
-
SHA512
87396c80ffcac241df73187acf716512b8df18970b1df2c521a45a7fb3506450b117eb87637ceba4ae73cc06ab13aca6a9572d272b162ce0fd1c067e9fec8227
-
SSDEEP
768:vaQ4ZapVSai7h2DKnNYaisB/YHBtuwgHR4E7t80gHieppOdFJM:v9TpcaQEmNY0JYHBtuw6SE7S1ie7OdFO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4244 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4244 rundll32.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\midimap.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\sysapp6.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\YUksuser.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File opened for modification C:\Windows\SysWOW64\YUksuser.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\ksuser.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\YUmidimap.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe File created C:\Windows\SysWOW64\midimap.dll JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe -
resource yara_rule behavioral2/memory/1484-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1484-10-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2332 sc.exe 2156 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 83 PID 1484 wrote to memory of 4332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 83 PID 1484 wrote to memory of 4332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 83 PID 1484 wrote to memory of 2332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 84 PID 1484 wrote to memory of 2332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 84 PID 1484 wrote to memory of 2332 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 84 PID 1484 wrote to memory of 2156 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 85 PID 1484 wrote to memory of 2156 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 85 PID 1484 wrote to memory of 2156 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 85 PID 1484 wrote to memory of 4244 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 89 PID 1484 wrote to memory of 4244 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 89 PID 1484 wrote to memory of 4244 1484 JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe 89 PID 4332 wrote to memory of 436 4332 net.exe 90 PID 4332 wrote to memory of 436 4332 net.exe 90 PID 4332 wrote to memory of 436 4332 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26a83887c83a6078bbd5984cfd4b35e.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1737363812.dat, ServerMain c:\users\admin\appdata\local\temp\jaffacakes118_e26a83887c83a6078bbd5984cfd4b35e.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5ed16295fa9301b5d8442bea33917b9e0
SHA1741242d7d9e309d4ecadbf8630ad49e063c63d88
SHA256d912f303aad6d0a403647bf641891160a8f189b358df6016dcb3a1b7becc3818
SHA51267668d80d16f7f0c3fb13470ce17a2c67f5b658a2ff90e44e9f1471266e73974389b1e3a4639790fb7115c094071317ca3d329d127be47342fa96982d1579273