Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe
-
Size
124KB
-
MD5
f92674327627e2db37cf2a8a76893fe9
-
SHA1
265846e8590ccce4343ce2344dc9787a984486e4
-
SHA256
722ab480efda8ae8f4fd63188013891636d276dd2b982642e1d921ece76e0d83
-
SHA512
3ce966b24932ab749b766aea4135cee50fdb2cbe3b89d7756896e44037b4c4986c0cf5ffd6c62cf6401bcfdbfbfa4fb549234dfa720fcc6ec3f32f410f9a2825
-
SSDEEP
3072:SyU79DqxobR/4lbSvxD09c8xzJDS6gwtOlRXJdg5pjuEE/:piLbR/452x0c8xc8Ig5E
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 920 rundll32.exe 2248 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skitula = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\AdmUIUsb.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4216 f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe 920 rundll32.exe 2248 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4216 wrote to memory of 920 4216 f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe 85 PID 4216 wrote to memory of 920 4216 f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe 85 PID 4216 wrote to memory of 920 4216 f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe 85 PID 920 wrote to memory of 2248 920 rundll32.exe 92 PID 920 wrote to memory of 2248 920 rundll32.exe 92 PID 920 wrote to memory of 2248 920 rundll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\AdmUIUsb.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\AdmUIUsb.dll",iep3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5f3c83e89feb6cffcf5aa3023cec1f70a
SHA1d12f689a27f4c142fe7dee423fc07e4cb91393a9
SHA256d6b05a408fa908d6f50eda7f68827cae0c6b8eb591e89adab1dd387d8b6300ca
SHA5129ee1aee26672ddc9300aa0df681e3cb34d01f08dc088522a1d11cc77946092e9c42b6b6668272d904ff63494243ed26a04cc61b73ee5552da55ded6910e7ccdd