Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll
-
Size
25KB
-
MD5
03fbe66a4ad02d4c8e6aa95085bd9fd7
-
SHA1
d6988ebad84dbdcc708a57133d8c0e2d1fe50b61
-
SHA256
c5ff906420d158ad7565618818958430d730e6dfa0b302f7321b4465eb0243d4
-
SHA512
3815d241a4f4ed9d9223ff2687ea62ee3288d7da2a21b08aae8e52444629a8054dd0484c05934b362adcc909fe9d47e4996ea6d0cd5db2dc97eb31b18965b313
-
SSDEEP
384:PM72XoSNd3BLWGZcjAzvZNeDEkVUZeT5cFUIFMC/4M+Idvb7nMcxyWxA8EAQLM:YaLBouZNeDweT5crqC/TD7oM
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msvcr.dll rundll32.exe File opened for modification C:\Windows\msvcr.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2836 rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll,1284106453,-1411280774,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1952 wrote to memory of 1744 1952 rundll32.exe 28 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29 PID 1744 wrote to memory of 2836 1744 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03fbe66a4ad02d4c8e6aa95085bd9fd7_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msvcr.dll",_RunAs@03⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD503fbe66a4ad02d4c8e6aa95085bd9fd7
SHA1d6988ebad84dbdcc708a57133d8c0e2d1fe50b61
SHA256c5ff906420d158ad7565618818958430d730e6dfa0b302f7321b4465eb0243d4
SHA5123815d241a4f4ed9d9223ff2687ea62ee3288d7da2a21b08aae8e52444629a8054dd0484c05934b362adcc909fe9d47e4996ea6d0cd5db2dc97eb31b18965b313