Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe
-
Size
106KB
-
MD5
0c098ca6abdb40468fc4165239d6e386
-
SHA1
4dbdecdf5bd571b46604fb0e330ff5387476d01d
-
SHA256
5dc75dcf46e08b693a2cc84e7f6325011e53f0d0fcdb1f34927d42c3f9310f8c
-
SHA512
7974c5b2756796e2bed26ef5e0eb7e60b4b61041785c25cfba912e696064140a4f359a0312251135be3e4586970d937e8aa3238d873a36b6a3026a2214b013f9
-
SSDEEP
1536:VlXX5EfNoRb7Kh+rjNu0A98FyK2GA3QY7tFyHgsQVDV3fkKfw2OoQNzkOZv:D58Si+rjNu0K8F9nAAknkKfw2FQNz1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 sz.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 rundll32.exe 1436 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xmiqilon = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Adb10cRu.dll\",Startup" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msapps\comsrvr.exe 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5032 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe 5032 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5032 wrote to memory of 2828 5032 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe 82 PID 5032 wrote to memory of 2828 5032 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe 82 PID 5032 wrote to memory of 2828 5032 0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe 82 PID 2828 wrote to memory of 1280 2828 sz.exe 83 PID 2828 wrote to memory of 1280 2828 sz.exe 83 PID 2828 wrote to memory of 1280 2828 sz.exe 83 PID 1280 wrote to memory of 1436 1280 rundll32.exe 95 PID 1280 wrote to memory of 1436 1280 rundll32.exe 95 PID 1280 wrote to memory of 1436 1280 rundll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c098ca6abdb40468fc4165239d6e386_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\sz.exeC:\Users\Admin\AppData\Local\Temp\sz.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Adb10cRu.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Adb10cRu.dll",iep4⤵
- Loads dropped DLL
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50cbcc8dd0f3a69809b6cfc269bcbe6a2
SHA1f2140c27135639de6f5fda2e58f98abd2df3d959
SHA256748d546f3e042a1cdf0ecf3cfab4f39a4dd59a21182ba1b72c00d32d19d4c47a
SHA51284ae27ab1c3caf0e67e2632bf8516e91125d059b769efada8792cf17fe325ee3ee1c4e29c9ab4971b2976bf9d0ce493af32fe41200edb30b342f6640eb7429ae
-
Filesize
72KB
MD527d29b640a0351167a5e1c2f3934e15c
SHA142e00978c09bec164cd3e07604df245a63f21702
SHA2567e234f9a6bbcddae144fc094c9588960a9d6e07d9789e26722c59f2d96c10570
SHA512dca6aeb2ac229b03c7dcdd9b45bbd74033fba19de96a95a522d015dd279ac0c3a60f690ea50d6be82805d36acf3bee94c9eff9b889bb1ee3ab789d145e2684b8