Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe
-
Size
128KB
-
MD5
f65197f77a612b3606dff8c102f2294e
-
SHA1
98baaa4f9f7542042f300f7aeb103874e8709fe4
-
SHA256
f1c7e6e38376df883b703459766eb8dc211afe710e0c26104d648f9a96c6a250
-
SHA512
1fe78bcff2d90156ccc8ce72f883f2e22e63e4e402651974a1ce2408226e0cb818e395af53d9fa55ea5580817c4a808f14a97c0f938e8f69ad0affa20b33f752
-
SSDEEP
3072:nqtPXhkyPDHMRFyBaDLSngKOlRUJ4m4WGQj7V0PzK:gPRPsRFyBavSng/mjGQj7Z
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aremanekulemunaj = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\odiplo.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 1696 rundll32.exe 2152 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1696 2364 f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe 30 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32 PID 1696 wrote to memory of 2152 1696 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f65197f77a612b3606dff8c102f2294e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\odiplo.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\odiplo.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5042e644e6eb3df1d5478455dc1e1f764
SHA10bdcccfd34b6437c216a47bd74b3689805ef8d30
SHA256cf98ef3c3a973dfaf53ba4982a77441563fe45ca0c958244d7b54c9981bc5d3c
SHA512b5e5901520409297cd9f6f6851b96f7d060d8b41f35548233b378dc43672dc01d842cf24608f68e4284be4a9a4dc2d17b33070119ef48ea74ec5d17ae6cd36b4