Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2480767dc36655a44fa347be54c72112_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2480767dc36655a44fa347be54c72112_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
2480767dc36655a44fa347be54c72112_JaffaCakes118.dll
-
Size
24KB
-
MD5
2480767dc36655a44fa347be54c72112
-
SHA1
f3671c8e51efb7616c37265b5a80bd34690dada5
-
SHA256
79dc5dcacf558b634325d66a514b495b190f443484b5d3928bb3124829a0f781
-
SHA512
69b49422d390e1a29fada91d5a11a7253681ded83787bb6db2d5edd3d1e41de26f3a825e0f16f6c2d8bb540b834c129f998970816042844df41e78eecaa117fa
-
SSDEEP
768:LM7863rrtlqF2pCRi9MddZGdQnlFXV2e1G73:I786zqF9WoXVbU73
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1704 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\pmnoOHXO.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pmnoOHXO.dll rundll32.exe File created C:\Windows\SysWOW64\pmnoOHXO.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{683E2552-188D-4F53-BC4C-32E0E94771E1}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{683E2552-188D-4F53-BC4C-32E0E94771E1} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{683E2552-188D-4F53-BC4C-32E0E94771E1}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{683E2552-188D-4F53-BC4C-32E0E94771E1}\InprocServer32\ = "C:\\Windows\\SysWow64\\pmnoOHXO.dll" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1676 wrote to memory of 1704 1676 rundll32.exe 28 PID 1704 wrote to memory of 432 1704 rundll32.exe 5 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29 PID 1704 wrote to memory of 2828 1704 rundll32.exe 29
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2480767dc36655a44fa347be54c72112_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2480767dc36655a44fa347be54c72112_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\pmnoOHXO.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD52480767dc36655a44fa347be54c72112
SHA1f3671c8e51efb7616c37265b5a80bd34690dada5
SHA25679dc5dcacf558b634325d66a514b495b190f443484b5d3928bb3124829a0f781
SHA51269b49422d390e1a29fada91d5a11a7253681ded83787bb6db2d5edd3d1e41de26f3a825e0f16f6c2d8bb540b834c129f998970816042844df41e78eecaa117fa