Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 23:59
Behavioral task
behavioral1
Sample
3285450677e921b1b266bae9f1454838_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3285450677e921b1b266bae9f1454838_JaffaCakes118.exe
-
Size
133KB
-
MD5
3285450677e921b1b266bae9f1454838
-
SHA1
3770f2bda71a6e46b87b0d97f3dadc0726b741b8
-
SHA256
0533b9330a60da8c7f8de8587ce3437d6b0f34c17c089bffe730d8e828279c80
-
SHA512
a9cbf292510f2cff9ee280aa7dc7a4b6c52d90be7f12c8751027663d7dbc1d9ce7fb520272a0d24b840d56c2e38c18cce6fee94b4adbbdf2e1fce9396086abcd
-
SSDEEP
3072:3gYRvksstTEq4Fn5f6J/cRLcfdcDjpg1P5SQRzI:3gAOt4q4l5f4cRofGB0gQFI
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 1 4800 rundll32.exe 11 4800 rundll32.exe 13 4800 rundll32.exe 17 4800 rundll32.exe 18 4448 rundll32.exe 22 4448 rundll32.exe 23 4448 rundll32.exe 24 4448 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 3285450677e921b1b266bae9f1454838_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 4800 rundll32.exe 4448 rundll32.exe -
resource yara_rule behavioral2/memory/1080-0-0x0000000000010000-0x000000000004B000-memory.dmp upx behavioral2/memory/1080-2-0x0000000000010000-0x000000000004B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3285450677e921b1b266bae9f1454838_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\machinez.inf rundll32.exe File opened for modification C:\Windows\inf\machinez.inf rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4800 1080 3285450677e921b1b266bae9f1454838_JaffaCakes118.exe 83 PID 1080 wrote to memory of 4800 1080 3285450677e921b1b266bae9f1454838_JaffaCakes118.exe 83 PID 1080 wrote to memory of 4800 1080 3285450677e921b1b266bae9f1454838_JaffaCakes118.exe 83 PID 4800 wrote to memory of 4812 4800 rundll32.exe 86 PID 4800 wrote to memory of 4812 4800 rundll32.exe 86 PID 4812 wrote to memory of 4448 4812 RunDll32.exe 87 PID 4812 wrote to memory of 4448 4812 RunDll32.exe 87 PID 4812 wrote to memory of 4448 4812 RunDll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3285450677e921b1b266bae9f1454838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3285450677e921b1b266bae9f1454838_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysTem32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
PID:4448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b9fdc50bfc219a4e4eae9d0cc464acf7
SHA1e77baea28ff4b791e129426ddf9874c26c9324be
SHA256f4972961a1b003bf9d874cf29db74747f003e97aefc1999828bfe182448d67fb
SHA5127aa253019930edba40eb6d8f83733fbdee85b29d9cc968228d2bbcf917e6c97b0ea4afd3d15f0a7c8e2fce462f7a04c175ae79b914690841dfe255969675a379
-
Filesize
201B
MD54806b7053371b064ba6b06e747b33fc6
SHA107b98bad980b519407bcbb5438dfc2d0a10ab017
SHA25607616898678c0081ce8b78d379473506e12217904531ab425219b148776e751e
SHA51209be0bbe2a9613a3947c74a18e2ff8383c6466124ac5c7128e3ca46e2181f84696cb440e3b3d08d16cd8070ec3b60cbeb989ab5e5180d06f960565e843be4f44