Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll
-
Size
25KB
-
MD5
b1f6dd0e743530ad2ed98e0d1b7387d1
-
SHA1
2af8bb54b4fabbd567241e794dd2b7f82f2a9eb2
-
SHA256
e7e35d583a1ebe2a6663f4b11ba88b238fd65239a72e5d3a0b5ca57852c38de9
-
SHA512
63ad80e47e66acb451793e7a558b1218c5df0d18da88ce93342b23fb51834268b5dd468ac79684bcca147c8871419d9d6f9bd759c28b59db9f4dfaa34f2b102a
-
SSDEEP
768:7HBn+plZ/RZaOW9JOc5ZyREURXv3fA+T2XAGSVM:7Bn+R5cz+jKefh+AvM
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msvcr.dll rundll32.exe File opened for modification C:\Windows\msvcr.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2720 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll,1287935853,1563368310,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1296 wrote to memory of 1868 1296 rundll32.exe 30 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31 PID 1868 wrote to memory of 2720 1868 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1f6dd0e743530ad2ed98e0d1b7387d1_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msvcr.dll",_RunAs@03⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5b1f6dd0e743530ad2ed98e0d1b7387d1
SHA12af8bb54b4fabbd567241e794dd2b7f82f2a9eb2
SHA256e7e35d583a1ebe2a6663f4b11ba88b238fd65239a72e5d3a0b5ca57852c38de9
SHA51263ad80e47e66acb451793e7a558b1218c5df0d18da88ce93342b23fb51834268b5dd468ac79684bcca147c8871419d9d6f9bd759c28b59db9f4dfaa34f2b102a