Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll
-
Size
9KB
-
MD5
3751ace32ef2721f9143e04ef2018483
-
SHA1
f046c68e486676530136c27c8c49c6f44a69f774
-
SHA256
cb2d9c0cea7ad753c655d6a1867a0cb9da08dd86dd10b25688dc4fbe11cbf617
-
SHA512
125cbcaa4c10b6e7c21b180f1a376a74d0d3f95e930cfa2d09004151f7f3f3c62881fb58d3adf6ba93ffa70d83203e474dae0a349c9828c932e958d65feab163
-
SSDEEP
192:g7QTqOhrA/qp6N2wBFg6RuAignGmr+jOSg:gsTqOhrAE6NXM6Rd9K+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2312 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30 PID 1712 wrote to memory of 2312 1712 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3751ace32ef2721f9143e04ef2018483_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6