Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 03:29
Behavioral task
behavioral1
Sample
eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe
-
Size
13KB
-
MD5
eefc7793478231c8aa8fe02ba0b64a0c
-
SHA1
04030a42b15be88f654cc441298d01d8e98bafd8
-
SHA256
ccb74fabe5d9891d87de64cd9c071c95a0fe10c032dfad3f7cbf7f834328d444
-
SHA512
f6f3b94ea20094e0688f0a136e07c4a5a084608e65e89fba9cba27a13b9303c1e8526fb60ee5941502febb6cf5c12e50f97ad0c2e4f3998986429c885b23b727
-
SSDEEP
384:6CsGRcZ16NrJ1DWNoTpAhNFHE4FXRjc5:6CsGRcbkzvpAfFH3y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1844 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1844 rundll32.exe -
resource yara_rule behavioral2/memory/4324-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4324-2-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sh17009.dll rundll32.exe File created C:\Windows\SysWOW64\sh17009.add rundll32.exe File created C:\Windows\SysWOW64\csrss.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\csrss.dll rundll32.exe File created C:\Windows\SysWOW64\rpcss.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\rpcss.dll rundll32.exe File created C:\Windows\SysWOW64\sh17009.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 rundll32.exe 1844 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1844 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1844 4324 eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe 82 PID 4324 wrote to memory of 1844 4324 eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe 82 PID 4324 wrote to memory of 1844 4324 eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe 82 PID 1844 wrote to memory of 3400 1844 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\~e57a0e3.~~~ INS C:\Users\Admin\AppData\Local\Temp\eefc7793478231c8aa8fe02ba0b64a0c_JaffaCakes118.exe3⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5672ae5ccbc36b9f617ba40c0e3d97996
SHA192bfdeaed520b9425140f2d9eeed4de4cf3c79c9
SHA256565e3074edbb47c661bc3e9eba22c0a080ce7e860c3c598c5ad958f6f0a92b48
SHA5127637a0d7ddb1fe9aa5e67c979ab250bb4962f60e4ec0eebb38ed2ac89386b46093cfa32a96f1ebd0c17a1dd3fc564b00182f20561028f125e3b14e64819f2afd