Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe
-
Size
53KB
-
MD5
67d7c08c8413ddc24efd9744d96af8c2
-
SHA1
2ea88cd2ec5e74d361efb1a9a6433d55e4f2abb4
-
SHA256
793d14f51a1af09192f9846e8408bf66241ee5c17c0d8abeb575f4cff4f05d3b
-
SHA512
bb0675ac0d6f7c9b41ecf3968e66324d4b93cd58634d5c0bafeaf90fa6ade9e3100d41205805453e741a891ca87a62d29a1e0b885bdd8e466e86836506982265
-
SSDEEP
768:VsK/sKcsBqkKSZPrj3RBMvIrN/jCYpKVu5pK8dv4pkn06FQtXHJxQ9E:JUwwaBbrN4I5ptdCi0F1HQm
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 38 1740 rundll32.exe 44 1740 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 1740 rundll32.exe -
resource yara_rule behavioral2/memory/1296-2-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1296-1-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1296-5-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1296-12-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1296-11-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1296-13-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1296-19-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1740-30-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1740-39-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\urqPhiIA.dll,#1" rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\fccdaaBq.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\cbXPiJaa.dll 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\cbXPiJaa.dll 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\urqPhiIA.dll 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\urqPhiIA.dll 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2587760-63ED-4EF5-B30D-A7C5B53EE597} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2587760-63ED-4EF5-B30D-A7C5B53EE597}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2587760-63ED-4EF5-B30D-A7C5B53EE597}\InprocServer32\ = "C:\\Windows\\SysWow64\\urqPhiIA.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2587760-63ED-4EF5-B30D-A7C5B53EE597}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1296 wrote to memory of 604 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 5 PID 1296 wrote to memory of 1740 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 98 PID 1296 wrote to memory of 1740 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 98 PID 1296 wrote to memory of 1740 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 98 PID 1296 wrote to memory of 4368 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 99 PID 1296 wrote to memory of 4368 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 99 PID 1296 wrote to memory of 4368 1296 67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe 99 PID 1740 wrote to memory of 5008 1740 rundll32.exe 103 PID 1740 wrote to memory of 5008 1740 rundll32.exe 103 PID 1740 wrote to memory of 5008 1740 rundll32.exe 103
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\urqPhiIA.dll,a2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\fccdaaBq.dll",s3⤵PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\67d7c08c8413ddc24efd9744d96af8c2_JaffaCakes118.exe"2⤵PID:4368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
36KB
MD52377d7567d7296f47a68eab0db975e5c
SHA17ef5871c460d085217a085eef96dce247c200f3c
SHA256df9d00c3bbafb30bab32d05982ae5ef196c540a66b0fd5795eae25e158a9131a
SHA512c163e3069cb501eecf54910650134dbad8ed4e93e801e38f003b8045e362f1b6b077ad01d0156f98c2f94f131923094addd2252fd0c19f6d8d0a9bcde50d4b9b
-
Filesize
1KB
MD5fd90302b492144848d0b6e1586b8ff59
SHA1d4113b3dd8562bd35b83fc061c150e40be88de62
SHA256f860168eb8130d37f549410bb59e3931e4a2dfb94cb49a1bb8675651433ffbc0
SHA51245d9a6eac2c3b70d549edcf524628493250516a77a3f6593ae673debb1996a425cf76eb1de8eb0d0382c762e3c2b75255b0b53701be2e1845c30748e2d4660bd