Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll
-
Size
1.0MB
-
MD5
ef6b9c22aa1630dbe3ae9ece27a42388
-
SHA1
fd28d2097d29ae003d3dfcfd3d6fcd431b19df22
-
SHA256
b075c5f47e03a3c0dfa2fefc974f283674042ecfc5e3b2361646aea041e42594
-
SHA512
1c4678b79bd5df66a482e7b675cc59ab47afd2504f0299780f5ba4ac4d50fcc2922810ea711e643b7840d2b2803868dbbfc7b4ec9cf45a64147dc6c0adc11da2
-
SSDEEP
24576:syZe4m2RBWSuBRJfAcEMtGziooofCmi8bVdbCL:sWtRANBRJfAuZ8KloW
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b00000001202b-3.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2244 pcl8D23.exe 1936 nbdr.exe -
Loads dropped DLL 6 IoCs
pid Process 2348 rundll32.exe 2348 rundll32.exe 2244 pcl8D23.exe 1936 nbdr.exe 1936 nbdr.exe 1936 nbdr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nbdr.exe pcl8D23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcl8D23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2928 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x00080000000164dd-13.dat nsis_installer_1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2928 PING.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2388 wrote to memory of 2348 2388 rundll32.exe 30 PID 2348 wrote to memory of 2244 2348 rundll32.exe 31 PID 2348 wrote to memory of 2244 2348 rundll32.exe 31 PID 2348 wrote to memory of 2244 2348 rundll32.exe 31 PID 2348 wrote to memory of 2244 2348 rundll32.exe 31 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 1936 2244 pcl8D23.exe 32 PID 2244 wrote to memory of 2764 2244 pcl8D23.exe 33 PID 2244 wrote to memory of 2764 2244 pcl8D23.exe 33 PID 2244 wrote to memory of 2764 2244 pcl8D23.exe 33 PID 2244 wrote to memory of 2764 2244 pcl8D23.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 35 PID 2764 wrote to memory of 2928 2764 cmd.exe 35 PID 2764 wrote to memory of 2928 2764 cmd.exe 35 PID 2764 wrote to memory of 2928 2764 cmd.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\pcl8D23.exe"C:\Users\Admin\AppData\Local\Temp\pcl8D23.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\nbdr.exeC:\Windows\system32\nbdr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DEL_2594.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\PING.EXEPing 127.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2928
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5fb1a5273d1a466208056da898d124cd6
SHA10cabc2bcaaed9a0567086f2da0f8864390c14a66
SHA256e4432b68b7ca6ebd2c298852b0f20830b68a74d2e6dd67fccb76551e4def71ee
SHA512eff5c0b3bdddcab656f551ed5efe5b7afb37bb10037591139757c8d0b372c7572c8eb1ea2fb8164ec3ca747a9355803c4d0e2987fbfa043c69632a7039521d31
-
Filesize
561KB
MD53faf9f2e276c13bc9e73403f7fa5896e
SHA1afecaa87a08a4a62a774d935585e4f328ed13197
SHA256f485414b90978616a58d60d55fa37969b4f1690fc4466df1f6836967ef7ad64b
SHA512e5db516b5b607be97c25cad0ca3699b92cc16356663283467815e26ac13775522a953381560ee06b446573525d184e2659dbfc1eef6b02ae4c78a73ad2461823
-
Filesize
527KB
MD5faa32dcff6b3dc36af814a9442e0c2af
SHA12fb8d1848dd297de5580fcee27c0ab98ba4e38f0
SHA2560ce8392ef1496262160ac5768108d5cdec9191b15bfd810cf853dbb5c9cc9a0f
SHA512697c9393c040d0526756122e34607e654fe1924ea522936acd1881dfe043faf097d1810379fb857b0c95c7b48fb7320129c4128954afc1634d708714d47cf2c4