Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll
-
Size
26KB
-
MD5
0b7dc6eb0e6e0a983f9dcbcbe15299d5
-
SHA1
ed837d65cd92d45e41d8556733aaa3e61d0bf9b2
-
SHA256
0a434703934f8f71ed8727e06e2f343c75782ba81ac96b7ff6adcbd394b436da
-
SHA512
7f585031c3558708dc067c5fced02396d706d3de4e5e92bc59640fcd669e9f1de7d67cea48e45f408e474a4097752cf10f8623883fde1255d4bd04a1ca987df9
-
SSDEEP
768:W7StJXmgcIL6uJ25u1fEgcJYuSJp8VXgGqM:eemgNYE1fEgcJYtJp8dgzM
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msvcr.dll rundll32.exe File opened for modification C:\Windows\msvcr.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2832 rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll,1286130595,1563368310,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1276 wrote to memory of 1776 1276 rundll32.exe 28 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29 PID 1776 wrote to memory of 2832 1776 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b7dc6eb0e6e0a983f9dcbcbe15299d5_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msvcr.dll",_RunAs@03⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD50b7dc6eb0e6e0a983f9dcbcbe15299d5
SHA1ed837d65cd92d45e41d8556733aaa3e61d0bf9b2
SHA2560a434703934f8f71ed8727e06e2f343c75782ba81ac96b7ff6adcbd394b436da
SHA5127f585031c3558708dc067c5fced02396d706d3de4e5e92bc59640fcd669e9f1de7d67cea48e45f408e474a4097752cf10f8623883fde1255d4bd04a1ca987df9