Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe
-
Size
534KB
-
MD5
5f0bb5d859680f429caf565adacbc438
-
SHA1
4ee0d94977518b142d7dcfcaa713c814b8614c2e
-
SHA256
3567de104c795a7d72d34ad711e2e87e33dedbce825158bcf295868bcce90704
-
SHA512
1e790031f3de58ea220adc8be1ba7a6b9722a997dd0d031ae3756a9660c4db1c65fbc995c4c5d19b6ab00178e9d44791c1f564ffb3311bc2cdb21126c8e11bb6
-
SSDEEP
12288:aB54If0JlqJIpN++VUdPWzGbZr/pS82kuw82A3vzqunS41gvt:aBFBEo+GPuGb3WZ6Azv
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2668 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 14 IoCs
pid Process 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\crtclient32.dll_xserve = "rundll32.exe \"C:\\Windows\\SysWOW64\\crtclient32.dll\",xserve" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crtclient32.dll 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 1412 wrote to memory of 2444 1412 5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe 31 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 3044 2444 rundll32.exe 32 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33 PID 2444 wrote to memory of 2668 2444 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f0bb5d859680f429caf565adacbc438_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\crtclient32.dll",install2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\crtclient32.dll",watch3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\crtclient32.dll",xserve3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5713014c101c0dc55845f7cc689792b4c
SHA1c604f1c6e96993dc609d3a47ab07a5f28042e812
SHA256aaa6ebd7e46248d263d7237b589f30b0bea26951b19ee59ce6179c9171c96139
SHA5124458d2abc8cfbbf86ca3238f09945d75464caa93e584db82852269c9f2960e36a4f2421eb856d8bc6b5386b64b019e58149e73c76e59fd4475606b99de79556a