Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe
-
Size
602KB
-
MD5
f1b5b6cb53076e23c387743a5e75c5ad
-
SHA1
08815abb077d98af8c83526ad58fa09a33956ba3
-
SHA256
3d3cb28adbf4ef03bf8dcff05f70ef6e95849eaafcb9a6ab4691f9b439d194ea
-
SHA512
21215c25d95e6f9a918e9791608c8aedb76873c10a7d3ef530be0f774fc606cf2c1de27d5b54b08f067b8bf0627848bf8a2bcbc44cf4c52fc9f2b10159a45fd0
-
SSDEEP
12288:cnepKaV9OaW0FjM7rxUpwEiAfKzG5dliFuJ2lkrdcakCoDL4+gt:MS/f7FjOrxkwEiGliFPl4taDL4+
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2648 rundll32.exe -
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 14 IoCs
pid Process 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\adtapi.dll_xserve = "rundll32.exe \"C:\\Windows\\SysWOW64\\adtapi.dll\",xserve" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\adtapi.dll f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 2984 wrote to memory of 820 2984 f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe 28 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2520 820 rundll32.exe 29 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30 PID 820 wrote to memory of 2648 820 rundll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1b5b6cb53076e23c387743a5e75c5ad_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\adtapi.dll",install2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\adtapi.dll",watch3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\adtapi.dll",xserve3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
482KB
MD5c9e6354da74735651c4cf9275c3025f5
SHA18f604d3e1321141779ae6faaa8f1d447dd175efd
SHA25623831333b5c91ff4e467b004fb362b3a117800ff254d30d831bdccb42ba43ffd
SHA5129faeeb29268c664dee255fdf8d83f0bccfbcdfe0d1df16a9a4d812b69f04421e9cfda8f86adbf44f5cb8db9c0ff47a24769fb39b5a41caf602ffce483ae3a1e7