Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe
-
Size
205KB
-
MD5
f5e188375b2e416719ae2d2d01e526e0
-
SHA1
3c9cc8ec71f0bb28c5c64841ab01448c0754cbd6
-
SHA256
5bcdbe356eae22c0adea4a935fccbe859f554f9678a4b7d2efa0824b3862ec3d
-
SHA512
539777d86cc1af6ea228fd0a190d85776e04dae60500d7dea49ebdbe951e088caf959cac4fc82b2ce16574b4a989cc11850b2b322bee66430eb39b1797985792
-
SSDEEP
3072:0IXqry+d3DxQcv7zhWPk65Ui8BhmqjNj8DCUNUO42YwHdKpUUzE0mu87Jw:dQCcv7Mk6bgL5jMCeU3dRCUI0mu8
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1340 2596 f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e188375b2e416719ae2d2d01e526e0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
168KB
MD52c65062b59ed04a041d131f0154f495c
SHA126f5287de625a4179f639531d6f61857222075aa
SHA2560596b8706492293de0b7a7e95d0d9cba21014bf7a0bf3364b81b18f6e8f73ce8
SHA512db740e4acf6e3fdbe7ac6e75acb21810959f5bba9a3135ac7c5bb3cee8c7dc1e96d8ae967728e69a035cb4b56a8893250b02fbd1450a71b854bba21beee9ad79