Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
rasEventdlg.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
rasEventdlg.dll
Resource
win10v2004-20240508-en
General
-
Target
2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe
-
Size
125KB
-
MD5
2288e3ac2f3c9ce2b6d7feabaed03755
-
SHA1
a1ecddd97f87a5541943e839875eea687fdf7392
-
SHA256
bca0512297bc9f94edf7995885d2b3604c535c8c9e6f0ab8a452dbfa0bfbbf1c
-
SHA512
46cc90c1cf0d6c21ce37c917e27fe24306900932b8d2c553d62dff5d4a892cc54933dec4d68536033b1c0e7505e2ce568970c4fb1d1d37c98f4f1868ebf08049
-
SSDEEP
3072:BIgv3rilU9S3BJoMe+261zwrF56SxSvM+sUwStS:BRb63ReFGwx56SsvM+sR
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1620 rundll32.exe 2484 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\usrPadWan = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\WinPath32\\usrPadWan.dll\",QuickcfgSvcs AsyncEventIde" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1620 3852 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 80 PID 3852 wrote to memory of 1620 3852 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 80 PID 3852 wrote to memory of 1620 3852 2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe 80 PID 1620 wrote to memory of 2484 1620 rundll32.exe 81 PID 1620 wrote to memory of 2484 1620 rundll32.exe 81 PID 1620 wrote to memory of 2484 1620 rundll32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2288e3ac2f3c9ce2b6d7feabaed03755_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\rasEventdlg.dll", QuickcfgSvcs oleWeb902⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\WinPath32\usrPadWan.dll",QuickcfgSvcs AsyncEventIde3⤵
- Loads dropped DLL
PID:2484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD54b54c0c2c843992045344fea9558c5d4
SHA19c502b47faad39ded674c80b3b65d0be69f2d536
SHA256142794326256a6df8ff72e405f3f0a781eb6765df8ecccb07a342d6af59ede34
SHA5127360355d7a7fc240d236d71a362d49233b7e6ea9b05cb6e29d222bf8654bb29108dc025eda719dc964b1f219b85cf91eef00885ee18e1501672ae62a169f38ba