Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
QuickMobileNotifier.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
QuickMobileNotifier.dll
Resource
win10v2004-20240508-en
General
-
Target
26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe
-
Size
124KB
-
MD5
26278fdf84de6c70e3bdf38233f955c5
-
SHA1
a672877466e3d211232f40f5888878a5adb74de8
-
SHA256
ae78931209d78f07d76bc36c4b468c36f4f42163ae5dc2717274a94abc6b3004
-
SHA512
2efdd383148258166e2cbc067d7fa3c27dde7cea3a470e24573708b882fb613ae62668c0338c23b8ee4f99b2c4809934c9a2d5391ab7d1d6268c5c138d2fbd3e
-
SSDEEP
3072:BIgv3rilU9S3BJoM+6GeX9yOx84NabZs/5YwPTeAp5f:BRb63R+xM9vxTa2zK25f
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1636 rundll32.exe 1636 rundll32.exe 1636 rundll32.exe 1636 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe 2760 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\odbccfgPort = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Desktopcfg32\\odbccfgPort.dll\",kbdWebspl d3dMouseTask" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 2932 wrote to memory of 1636 2932 26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe 28 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29 PID 1636 wrote to memory of 2760 1636 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26278fdf84de6c70e3bdf38233f955c5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\QuickMobileNotifier.dll", kbdWebspl confWIaudio2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Desktopcfg32\odbccfgPort.dll",kbdWebspl d3dMouseTask3⤵
- Loads dropped DLL
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD522ab315451e84d7086cd82886739e21f
SHA127d9977c025c540a9858fb4ec8175d22a0c981be
SHA2567c3549e22cb296792b522841d3d7c925ac9356dfcaad2fbabf590eda9ec44c12
SHA5129ec862f3f7553bb76d68d1f081b33f564e5c81d8fcb97813ca5dffed466bb51f834240f3bed4454774ea8008f7010642555f5458f3768ba17c9676b317e751d8