Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe
-
Size
17KB
-
MD5
d695a6e0731a75bf9a667617b54a2f77
-
SHA1
2e5c4e13322dfebae47f76906cb6d39bbf6ffd13
-
SHA256
525f7b195f51dec7029300289eaaf4c6d93a1badfb55c3af8ee92d013dd6dc4b
-
SHA512
4ff889393fb568ba1e48732d567f89440bb91ddbf0722cbef7291377644434fe48e3224c6b9da86062ecb18d7222281e3751d18924694cfaf7df89aea41ef584
-
SSDEEP
384:0edQZBSx4hO2fCRHDXEutzk0cSnCpacoqj771KZx5jI0/JGO+AxTr6+I9PfYUDr0:Pd6xnC9DUSzkPSCVzrx0/JGOJxqLoI4T
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1508 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Darkbomb.dll d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2776 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2776 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2776 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2776 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2776 wrote to memory of 2756 2776 cmd.exe 32 PID 2648 wrote to memory of 1508 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 33 PID 2648 wrote to memory of 1508 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 33 PID 2648 wrote to memory of 1508 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 33 PID 2648 wrote to memory of 1508 2648 d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d695a6e0731a75bf9a667617b54a2f77_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "c:\support338945a0.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe Darkbomb.dll FunctionStart3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D695A6~1.EXE >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD57de66c5ded87e8c7e46b1bc9ee2c5db2
SHA1ea9db0f6c616732e88b60e2339dea25ae3b4d109
SHA2565318c5930266539909563b14eec3b9a4ab8996bbdae808a94b51261546aeebf5
SHA5124c56dc2501244cd2b562aef18344fca823a72ac92e2619d8ead0a6714b159fdc14125018c63072c12a956c0501eef9b4e51563e4f4f01768805950b32aa31c9f
-
Filesize
39B
MD5d6ad254c75599ac9ceb317d261cfe354
SHA1f9c9bae9bdba0ea9d3c486e13cb554ec9b010909
SHA2563142a7859b079df4a8fd3daf7a9d0057dd2c18ca302c69a6f9526ee543c9a655
SHA512b05820cab51f66b5b8213359f0a0ddde125e3eab5fdfd196393dc805fc02fd9e72bdb1704cc0718131fc55a8b3d7cd7e54f53fa8140a187b508c443f6d85b473