Analysis
-
max time kernel
140s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe
-
Size
92KB
-
MD5
213c6db9db5a06b42d110987d77d1111
-
SHA1
c586fdc3bd8cab794517c82e018a55ecaece742d
-
SHA256
c9c42fa50740ee487ffe89ea887ac68cb214d77f635dca749e161e99d4b1bda4
-
SHA512
35663c639068a543e553976267d2737a62b20297ffe3d5f2ef315658429aab8d13030a25da68dff3ae2b891f4935c9b49a8dabe29394376b664c530c1aa5a64c
-
SSDEEP
1536:jWv+i3J2OUhdb7b966LljCt+pHmdUm3omWbB6lfwyTiyIMR:jW2i52Oc5b966RjCttdUm3omW8hTdl
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 636 rundll32.exe 948 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xyamegosu = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\phFromfg.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe 636 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3192 wrote to memory of 636 3192 213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe 81 PID 3192 wrote to memory of 636 3192 213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe 81 PID 3192 wrote to memory of 636 3192 213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe 81 PID 636 wrote to memory of 948 636 rundll32.exe 90 PID 636 wrote to memory of 948 636 rundll32.exe 90 PID 636 wrote to memory of 948 636 rundll32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\phFromfg.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\phFromfg.dll",iep3⤵
- Loads dropped DLL
PID:948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD543c774f49339c0f8a48d95b8613463fa
SHA16c5395823d27d4c22d77773287cbf35e60ab466a
SHA25699a85df5ad4031665f92d89ed0bb3970ad16547e68934083cc8f7adccbd9fd4d
SHA5120339979e37ad101352e28e8769457cb702f0629de1e5869c5da10ed0a51fd8bf3e04d1d7aca42b30e9b733050708ed8f1e1dcf49f95f0ad1bf325af90772587c