Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 02:51

General

  • Target

    a0efbc85972beb4c04e0e048f0206e32_JaffaCakes118.dll

  • Size

    190KB

  • MD5

    a0efbc85972beb4c04e0e048f0206e32

  • SHA1

    65d354edfff9339d6be1ecf2a0db70177e92807e

  • SHA256

    b73ecf67b6cbae3deb994df37aa10b6996546febaf9fe7ee242ce89171dfea70

  • SHA512

    02eea1b0d5a6edd08e3be3fc64a2d4ae98577821bc9f770d1b2ee038be7fd20e24cf2376c55980f38c2037f195a28a4dab47037ed29084f2983ef3451ba91e63

  • SSDEEP

    3072:zT2IbXxpxQi4sJvkxfwLwucvvDowoGRP/tSqyjNKjVkKVQrs:zTjbXxpxMyNLw7oGRNSLNK

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 7 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0efbc85972beb4c04e0e048f0206e32_JaffaCakes118.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0efbc85972beb4c04e0e048f0206e32_JaffaCakes118.dll,#1
          3⤵
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1040
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            4⤵
            • Drops file in Drivers directory
            • Event Triggered Execution: Image File Execution Options Injection
            • Drops autorun.inf file
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Nskhelper2.sys

      Filesize

      3KB

      MD5

      10dac5e7c542b30d63cc07edc557690c

      SHA1

      f15be8d534333c78b806a3dfea014baf0727f019

      SHA256

      026f7a4955e7a237be8437ab22fdb9e408c23765306417675a77885386934213

      SHA512

      f45d9ba430fe6942bfdf3bad793e5ad6e871e505dee71d4319e623ed86a7fe9a680d0011996c06e37260988349658e7bfbd59b8c683a83c5512613ae6a7f85c3

    • F:\autorun.inf

      Filesize

      109B

      MD5

      994321839feb25dc719c193bacf71683

      SHA1

      827e5cfc47ab752b874bcadadef0b60c17c333d3

      SHA256

      2d5d1dd2789c9b004226e30914652e2f8e9cee68261adb870710799e42f9dbbe

      SHA512

      0b108336cd315f264d1ecb166a878242be0651c1010d5ec8049441b9b231a7800eed2d46b6dbc506e305e01f5c5b55380a3338d3505db97247b2c8b21011306e

    • F:\system.dll

      Filesize

      41KB

      MD5

      68955409c71f4613addd65017c826e15

      SHA1

      4b41dfe4b21248d461146272da2ecb2c27023fe4

      SHA256

      b6a23c6999081b6c2ab4fafc2b3575c3b116d108c133badc7e0b544e9193f854

      SHA512

      e6ad66368fe24edf7b6463a4d12d29871d06de7b4bcebec15903fd8d4502303fac35867c7df150b5168b5f767a701070aff87f2aa2145b62c880b7cb278e5d1a

    • memory/2416-1-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB