Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
rasEventdlg.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
rasEventdlg.dll
Resource
win10v2004-20240508-en
General
-
Target
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
-
Size
125KB
-
MD5
2288e3ac2f3c9ce2b6d7feabaed03755
-
SHA1
a1ecddd97f87a5541943e839875eea687fdf7392
-
SHA256
bca0512297bc9f94edf7995885d2b3604c535c8c9e6f0ab8a452dbfa0bfbbf1c
-
SHA512
46cc90c1cf0d6c21ce37c917e27fe24306900932b8d2c553d62dff5d4a892cc54933dec4d68536033b1c0e7505e2ce568970c4fb1d1d37c98f4f1868ebf08049
-
SSDEEP
3072:BIgv3rilU9S3BJoMe+261zwrF56SxSvM+sUwStS:BRb63ReFGwx56SsvM+sR
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\usrPadWan = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\WinPath32\\usrPadWan.dll\",QuickcfgSvcs AsyncEventIde" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 1868 wrote to memory of 2808 1868 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29 PID 2808 wrote to memory of 2068 2808 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\rasEventdlg.dll", QuickcfgSvcs oleWeb902⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\WinPath32\usrPadWan.dll",QuickcfgSvcs AsyncEventIde3⤵
- Loads dropped DLL
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD54b54c0c2c843992045344fea9558c5d4
SHA19c502b47faad39ded674c80b3b65d0be69f2d536
SHA256142794326256a6df8ff72e405f3f0a781eb6765df8ecccb07a342d6af59ede34
SHA5127360355d7a7fc240d236d71a362d49233b7e6ea9b05cb6e29d222bf8654bb29108dc025eda719dc964b1f219b85cf91eef00885ee18e1501672ae62a169f38ba