Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll
-
Size
26KB
-
MD5
151aee3d13c9aae25ec3999f266ee1ff
-
SHA1
4255614866f0bbe4885353db0598f88cc0354871
-
SHA256
ec7d940ef4adc70e243db773c9a5b776823725e64d931d5d1b38c216cdf51c7e
-
SHA512
14438edcd4a1015acd8bf14361d51ed9e67da0dac4e2cb2c2806f901da781fe24b83e3b6231eae9105d26601074ef2aa91cb5cf0f884f5ee203da502a8a25010
-
SSDEEP
768:sdh9fQUpt79DTowgzkKPK6QOWVTnSlmg1wUulxC/3ESrDvL:QoUpzDTo1Q+UtSMuuloPESrDvL
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\oficx.dll rundll32.exe File opened for modification C:\Windows\oficx.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2144 rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll,1293806123,641534121,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe 2144 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 2192 wrote to memory of 1520 2192 rundll32.exe 28 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29 PID 1520 wrote to memory of 2144 1520 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\151aee3d13c9aae25ec3999f266ee1ff_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\oficx.dll",_RunAs@163⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5151aee3d13c9aae25ec3999f266ee1ff
SHA14255614866f0bbe4885353db0598f88cc0354871
SHA256ec7d940ef4adc70e243db773c9a5b776823725e64d931d5d1b38c216cdf51c7e
SHA51214438edcd4a1015acd8bf14361d51ed9e67da0dac4e2cb2c2806f901da781fe24b83e3b6231eae9105d26601074ef2aa91cb5cf0f884f5ee203da502a8a25010