Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 16:53
Behavioral task
behavioral1
Sample
39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$TEMP/4HKMbhZs.dll
Resource
win10v2004-20240709-en
General
-
Target
39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe
-
Size
102KB
-
MD5
39f9c4646aadcf838d55ae8e2740d4f4
-
SHA1
2823506139411f72f741e75ef12a68f0299614d5
-
SHA256
9fbc1790000d9bbacf0741202751acd56ce986393adaeba6c6f8c8f61aa62fe0
-
SHA512
44ac8bba1fa939f3dcc775a3280fbfd46f090d2d105a7129d4aa8534e78271dac0ad40be0f807b7392a1d24d982f76b9039c50b8a129ef2417f1d185354beb5c
-
SSDEEP
3072:IgXdZt9P6D3XJbCLHc7La7XTvjMq53CzFWcnL:Ie344DcXYLgqwRWcL
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 2344 rundll32.exe 8 2344 rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000010300-2.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe -
resource yara_rule behavioral1/files/0x0006000000010300-2.dat upx behavioral1/memory/2344-4-0x0000000000130000-0x0000000000153000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2512 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 rundll32.exe 2344 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2344 2888 39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe 30 PID 2344 wrote to memory of 2532 2344 rundll32.exe 33 PID 2344 wrote to memory of 2532 2344 rundll32.exe 33 PID 2344 wrote to memory of 2532 2344 rundll32.exe 33 PID 2344 wrote to memory of 2532 2344 rundll32.exe 33 PID 2532 wrote to memory of 2512 2532 cmd.exe 35 PID 2532 wrote to memory of 2512 2532 cmd.exe 35 PID 2532 wrote to memory of 2512 2532 cmd.exe 35 PID 2532 wrote to memory of 2512 2532 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39f9c4646aadcf838d55ae8e2740d4f4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\4HKMbhZs.dll",Install C:\Users\Admin\AppData\Local\Temp\4HKMbhZs2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\4HKMbhZs.dll" >> nul3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.14⤵
- Runs ping.exe
PID:2512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD50fb9531773620119d1c222f88c450bc5
SHA19d3b3095dfe2f9ee45e47c9cdc129a2fbadb47e1
SHA25664aeb182ccd17e8ff2a72b6bef8bba17df8eaaeabd80acaeae2c01b138c5eea6
SHA512581f98535d8263b77005d215c3145087236f7a3e97eb0d350225fc0832f27ef145a46571080f1cab542181d200cb8a54fd1b85016ae3d03b3e335b3ef03b938c
-
Filesize
71KB
MD5f6df0c1ed00d1c1a3a2976ba832765d6
SHA1315b1a41b0e6328543e6cd31ab114fd144aecdbb
SHA256b38ba468cb301b7cb3db3262ebdbfc045c485a0bb2947d59461cba198900f24e
SHA5127850224f293943a0476e2d8ce3082f93881dbbc107d482ec655ea5f1b4f73b208361fe7422e2b99c7980bc6774ead4813e43eb3e1e0cd34868817a993cab5d75