Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
baa61de92a5902932b23af7cd4dbd064_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
baa61de92a5902932b23af7cd4dbd064_JaffaCakes118.dll
-
Size
292KB
-
MD5
baa61de92a5902932b23af7cd4dbd064
-
SHA1
d42e6ed45183e60363018bc7d348942961413cee
-
SHA256
84a44723e1dd6ff37401ed3eb7cab8bd799f681d220560f7e473fcf6f789afc8
-
SHA512
c1505ba8ea413d1c93784d19ecf200c622404fb009211e53841454a0e1b6a00ad72e8238ecebdadf430d417a3c8ef3e795fe6e43cdcf2b92373154f1f53fe19c
-
SSDEEP
6144:/tBX7+scbRWpga7EGXB/dvlhsWDCpeCqTf7P:FNCHK/B1NGjm7P
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1812 rundll32mgr.exe 1940 WerFault.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 rundll32.exe 3068 rundll32.exe -
resource yara_rule behavioral1/files/0x000700000001211a-3.dat upx behavioral1/memory/1812-16-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1812-11-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File opened for modification C:\WINDOWS\SYSWOW64\WERFAULT.EXE rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1940 3068 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 25 IoCs
pid Process 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe 1812 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1812 rundll32mgr.exe Token: SeDebugPrivilege 1812 rundll32mgr.exe Token: SeTakeOwnershipPrivilege 3068 rundll32.exe Token: SeRestorePrivilege 3068 rundll32.exe Token: SeBackupPrivilege 3068 rundll32.exe Token: SeChangeNotifyPrivilege 3068 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 2384 wrote to memory of 3068 2384 rundll32.exe 30 PID 3068 wrote to memory of 1812 3068 rundll32.exe 31 PID 3068 wrote to memory of 1812 3068 rundll32.exe 31 PID 3068 wrote to memory of 1812 3068 rundll32.exe 31 PID 3068 wrote to memory of 1812 3068 rundll32.exe 31 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 384 1812 rundll32mgr.exe 3 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 392 1812 rundll32mgr.exe 4 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 432 1812 rundll32mgr.exe 5 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 476 1812 rundll32mgr.exe 6 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 492 1812 rundll32mgr.exe 7 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 500 1812 rundll32mgr.exe 8 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 604 1812 rundll32mgr.exe 9 PID 1812 wrote to memory of 684 1812 rundll32mgr.exe 10 PID 1812 wrote to memory of 684 1812 rundll32mgr.exe 10 PID 1812 wrote to memory of 684 1812 rundll32mgr.exe 10 PID 1812 wrote to memory of 684 1812 rundll32mgr.exe 10
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1524
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:552
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:112
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:352
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1060
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1236
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1268
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baa61de92a5902932b23af7cd4dbd064_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baa61de92a5902932b23af7cd4dbd064_JaffaCakes118.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 2244⤵
- Executes dropped EXE
- Program crash
PID:1940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD55feab868caedbbd1b7a145ca8261e4aa
SHA1f43f28cc5165608e6fb3794e9a3d083ca2c75f0e
SHA25608bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c
SHA51291108ab6dd422c1d500fc0a65df6faffdb7000828a0f908b1c053129b4b8702fdb7309fa3f4f6054ad542dfe24fd4853e2fe32f7e45aa369e7a3cb6137bdaca1
-
Filesize
239KB
MD525e45639d3f4732a5cddf01ab51ea80a
SHA14055341b35b6c78b51c49c5fd68f3db9406bc9f4
SHA256e75f640d97d354ae30de73299c48b6682bfae37d8f440e618e033007af9d833a
SHA5122c3667c5a567081c1fa8f94bd613e3a4031a5287737f2954b50623eabcb56f600cabec09a1850e9ea2949d8d5d28d4657caa318a3d7b75addc21306be940b93e