Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe
-
Size
36KB
-
MD5
ce7c71cc261ddd965fa4c72758e10fa6
-
SHA1
a8fc0f5e73e02bbe78848f9eab4b7ff58faa20d5
-
SHA256
6f18993bac4837ea42ebc8a43c38a4b6442ae3ecdd0f7815d88e1ae61537d5b6
-
SHA512
86d88d5dd8fc7eeb941e82b42b31cf0f994c25c549cc0830e84a65e312b8133a27cd8d33586cd91c301bd5d2c0a30694f3e27a15675ce2d9e19e08e864cdbaee
-
SSDEEP
768:YQbo7cAirHFozG4yYa4pJ6OYvOOmiZeGmFFz/FJfaquJRn:XbESFoapgnipmFFz/vf
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4172 rundll32.exe 2592 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\A00FE57A4EB.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\_A00FE57A4EB.exe" ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Logon = "B" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661 rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Asynchronous = "1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\DllName = "C:\\Windows\\system32\\__c0066661.dat" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Impersonate = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Startup = "B" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Startup = "B" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Logon = "B" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\Asynchronous = "1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0066661\DllName = "C:\\Windows\\system32\\__c0066661.dat" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\__c0066661.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\__c0066661.dat rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 4172 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4172 rundll32.exe 4172 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 636 wrote to memory of 4172 636 ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe 84 PID 636 wrote to memory of 4172 636 ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe 84 PID 636 wrote to memory of 4172 636 ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe 84 PID 4172 wrote to memory of 2592 4172 rundll32.exe 86 PID 4172 wrote to memory of 2592 4172 rundll32.exe 86 PID 4172 wrote to memory of 2592 4172 rundll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\ce7c71cc261ddd965fa4c72758e10fa6_JaffaCakes118.exe.dat",A2⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\__c0066661.dat",B3⤵
- Loads dropped DLL
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 6323⤵
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4172 -ip 41721⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58884dad971558d518e95c051967a0984
SHA1ae98b8c930e7d8235ca5544642b1996a2cb1cbd4
SHA2561a72e50afce0ee33fb6508f27ab549b85dead8d431622887d4a2eeebf444274d
SHA512a35fd92f1d05f1283869ae3a2440d70766b989035dbad121929864f1e4f7d00adf7cce68a44bcc2fc17f2ada3e13c508ec15ce5f43c64346bad2756e1a8c2717