Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0fdc30140bc0bc502bf7b64baa7160dc_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fdc30140bc0bc502bf7b64baa7160dc_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0fdc30140bc0bc502bf7b64baa7160dc_JaffaCakes118.dll
-
Size
129KB
-
MD5
0fdc30140bc0bc502bf7b64baa7160dc
-
SHA1
0de530195c992741d986a7e41ca899bb0dd33d43
-
SHA256
b0534b9267e19764f277eb082fea0a10a3788a885c701585e64b9ee0d40b8432
-
SHA512
256d0969b3e3db80a600ad49c9cbc1ab4b49f308bb4708f2fb1cfc6d7bbb0441c186e7ec60f359200398ce7de523c40c8b8cbe043b4d420de879bcad22b1260c
-
SSDEEP
3072:6aoJIvXFc9JZR+1z4aeW7M6noa9HOL5PFn0wcccccccc:teaeI1zperAoa9H0PFn0wcccccccc
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1184 rundll32.exe 3 2612 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\{4F3158A8-F484-438C-B676-5F136CAA2E87} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{4F3158A8-F484-438C-B676-5F136CAA2E87}\\4a2.dll\",DllGetClassObject secret 29352" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 rundll32.exe 2612 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 2428 wrote to memory of 1184 2428 rundll32.exe 28 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29 PID 1184 wrote to memory of 2612 1184 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc30140bc0bc502bf7b64baa7160dc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fdc30140bc0bc502bf7b64baa7160dc_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{4F3158A8-F484-438C-B676-5F136CAA2E87}\4a2.dll",DllGetClassObject secret 293523⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD50fdc30140bc0bc502bf7b64baa7160dc
SHA10de530195c992741d986a7e41ca899bb0dd33d43
SHA256b0534b9267e19764f277eb082fea0a10a3788a885c701585e64b9ee0d40b8432
SHA512256d0969b3e3db80a600ad49c9cbc1ab4b49f308bb4708f2fb1cfc6d7bbb0441c186e7ec60f359200398ce7de523c40c8b8cbe043b4d420de879bcad22b1260c