Analysis
-
max time kernel
144s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
432d550faf4b1d7e70e728cd7d5a9300_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
432d550faf4b1d7e70e728cd7d5a9300_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
432d550faf4b1d7e70e728cd7d5a9300_JaffaCakes118.dll
-
Size
129KB
-
MD5
432d550faf4b1d7e70e728cd7d5a9300
-
SHA1
5eb6b15d5908ef1b0e9d99cf8153abba710a99e1
-
SHA256
0481fdf58dd0b10d791d1c9e0813c66907dc07f5ce0257508bad7e2bd36d8273
-
SHA512
44f2d2d99daca02b5d6e74580fed863fa1a7e5019c502273ca9568757cc72e87ac911ace8df0707fcee3d4cc44397fdb6f74ff86bbcad9ca0a91a1586a56872e
-
SSDEEP
3072:2sgJKSs1RmJsduTgkafc+FCncd/jP0QeTbl0LbKKpLLgxYR3OL5PFn0wcccccccc:8gRz6+v+r0qK1+k30PFn0wcccccccc
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2888 rundll32.exe 3 2736 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{17CF15A9-B54F-471C-AA90-7351D52CB00A} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{17CF15A9-B54F-471C-AA90-7351D52CB00A}\\7026.dll\",DllGetClassObject secret 23563" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 rundll32.exe 2736 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2240 wrote to memory of 2888 2240 rundll32.exe 29 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30 PID 2888 wrote to memory of 2736 2888 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432d550faf4b1d7e70e728cd7d5a9300_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432d550faf4b1d7e70e728cd7d5a9300_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{17CF15A9-B54F-471C-AA90-7351D52CB00A}\7026.dll",DllGetClassObject secret 235633⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5432d550faf4b1d7e70e728cd7d5a9300
SHA15eb6b15d5908ef1b0e9d99cf8153abba710a99e1
SHA2560481fdf58dd0b10d791d1c9e0813c66907dc07f5ce0257508bad7e2bd36d8273
SHA51244f2d2d99daca02b5d6e74580fed863fa1a7e5019c502273ca9568757cc72e87ac911ace8df0707fcee3d4cc44397fdb6f74ff86bbcad9ca0a91a1586a56872e