Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe
-
Size
54KB
-
MD5
3da595f9fe79b3215068f283316f3381
-
SHA1
0e9ad39530b68569c65e8ae40261892f3379ba13
-
SHA256
c6a172321846eef99245cb9ad19935c2c17e604b578b5d6dcbce9b374270051a
-
SHA512
c10d5bbdf71781650e161145231f685331dfa158bd02fc3385527e7a7d0d13aa99ea9ffb33903f6f67b4969be837f16065ef339e3633edcf7b13ce36c43ec1e5
-
SSDEEP
768:BBP862sr/+uPuMwed5pGiFuY2CTjuKx5lb4yXI6fcrWkLdyhzFZZqBGu2gA:D8Q+uRdPYCWkHb/I6VkxmeGtgA
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ebutejo = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\mfurderi.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe 1316 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1316 2568 3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe 30 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32 PID 1316 wrote to memory of 2892 1316 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3da595f9fe79b3215068f283316f3381_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\mfurderi.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\mfurderi.dll",iep3⤵
- Loads dropped DLL
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5450b95a0cd05f723e45dad1bb4ca1674
SHA1aae55dc8d79c38a257de5038614ec0bbfd11ad6a
SHA2564435dc6858d7dd2638a08cf06c9e0dbc8278f2e704e9de7da25d215b5e7c2708
SHA512e17040ea1d41838ebb75792f5190489333a061ac42a9f66d5f1a10cb7f9833b50eac388376632430a88ce29c860128b53356c674fc809b0661dfb1e91077b638