Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:47
Behavioral task
behavioral1
Sample
764044617e89d1c70f743bf956bda882_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
764044617e89d1c70f743bf956bda882_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
764044617e89d1c70f743bf956bda882_JaffaCakes118.dll
-
Size
86KB
-
MD5
764044617e89d1c70f743bf956bda882
-
SHA1
19565aad64438f681a07f4b8fcf797fea7401298
-
SHA256
b3090d6e37b601377d220aa08b56e76a475e89ac669b6a4a14f3875a64c6e297
-
SHA512
995e3b4d974c77109090642b41d31868d9c9240ab0894351b8c8d3716197459c28bed36b8ef8ced5c8ac933923e92befc49d70e04583795f7816b39fd09bcd3e
-
SSDEEP
1536:R1c5o/vvxg/PhMcp1b9gcXBmot9OjtgRVJbuO8DFr38wYdBjCBEq:g5db9gcRmoGxejuO8DFfcB
Malware Config
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 6 2308 rundll32.exe 8 2308 rundll32.exe 9 2308 rundll32.exe 10 2308 rundll32.exe 15 2308 rundll32.exe 17 2308 rundll32.exe 18 2308 rundll32.exe 20 2308 rundll32.exe 29 2308 rundll32.exe 30 2308 rundll32.exe 31 2308 rundll32.exe 32 2308 rundll32.exe 34 2308 rundll32.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2152 netsh.exe -
resource yara_rule behavioral1/memory/2308-2-0x00000000001B0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2308-3-0x00000000001B0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2308-12-0x00000000001B0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2308-13-0x00000000001B0000-0x00000000001DD000-memory.dmp upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 checkip.dyndns.org 3 checkip.dyndns.org -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Security rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Security\installation_id = 1dbfa0dab337e84d88255b201df4b207 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2452 wrote to memory of 2308 2452 rundll32.exe 31 PID 2308 wrote to memory of 2152 2308 rundll32.exe 32 PID 2308 wrote to memory of 2152 2308 rundll32.exe 32 PID 2308 wrote to memory of 2152 2308 rundll32.exe 32 PID 2308 wrote to memory of 2152 2308 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\764044617e89d1c70f743bf956bda882_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\764044617e89d1c70f743bf956bda882_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\SysWOW64\rundll32.exe" "Explorer" enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1