Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
282ef8704418a1fd2279dc2496078d5a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
282ef8704418a1fd2279dc2496078d5a_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
282ef8704418a1fd2279dc2496078d5a_JaffaCakes118.dll
-
Size
127KB
-
MD5
282ef8704418a1fd2279dc2496078d5a
-
SHA1
f039545e2612e0e8f5014b758be8a32170046b9f
-
SHA256
f84179c224653f4338b5f9a09fc55db0b53a3f470e20ec02f7ba8052df35d2ab
-
SHA512
6d57d721c43793f7bddbbbdb3a99dd752277fb05385278cc6b0946d3ebac59801711987bec4e5d30d623f19587f19d4ce039cb133da8fecdd8a7fd857ff33e17
-
SSDEEP
3072:UUkxO1cO5JJL7KWk/iWNZ55YLB2xND3OL5PFn0wcccccccc:6xSvlL7Nk6WV5IB2xND30PFn0wcccccI
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2056 rundll32.exe 3 2712 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{0EC22056-5CA0-4289-9565-B77F5E12B868} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{0EC22056-5CA0-4289-9565-B77F5E12B868}\\ad5.dll\",DllGetClassObject secret 24312" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 rundll32.exe 2712 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2864 wrote to memory of 2056 2864 rundll32.exe 30 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31 PID 2056 wrote to memory of 2712 2056 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\282ef8704418a1fd2279dc2496078d5a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\282ef8704418a1fd2279dc2496078d5a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{0EC22056-5CA0-4289-9565-B77F5E12B868}\ad5.dll",DllGetClassObject secret 243123⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5282ef8704418a1fd2279dc2496078d5a
SHA1f039545e2612e0e8f5014b758be8a32170046b9f
SHA256f84179c224653f4338b5f9a09fc55db0b53a3f470e20ec02f7ba8052df35d2ab
SHA5126d57d721c43793f7bddbbbdb3a99dd752277fb05385278cc6b0946d3ebac59801711987bec4e5d30d623f19587f19d4ce039cb133da8fecdd8a7fd857ff33e17