Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
fc857bb077bf663898f15e0fab8b5db5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc857bb077bf663898f15e0fab8b5db5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fc857bb077bf663898f15e0fab8b5db5_JaffaCakes118.dll
-
Size
11KB
-
MD5
fc857bb077bf663898f15e0fab8b5db5
-
SHA1
f6908596a9596e84cb66a7e6077948c2be04806d
-
SHA256
9bb1ae355e58b2d79543fa03167afebe1fe0e275582d96c7ce3547ce31570b9a
-
SHA512
bf9f20e8308f364388c3f440409ff0098544dd86e07e9801dd27c01b392bc0c7678b37ecfcd1aded787978d31359a30ff7c7a9ff70baaed0e8c19a108aa76249
-
SSDEEP
192:GglCNy5/L8rBe6oi/J/kgLeYADlaoyqVuF6xR:AEJ8rc6oCJ/kgKxDllVuF
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2860 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" rundll32.exe -
Drops autorun.inf file 1 TTPs 24 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\S:\AutoRun.inf rundll32.exe File created \??\T:\AutoRun.inf rundll32.exe File created \??\V:\AutoRun.inf rundll32.exe File created \??\X:\AutoRun.inf rundll32.exe File created \??\K:\AutoRun.inf rundll32.exe File created \??\L:\AutoRun.inf rundll32.exe File created \??\M:\AutoRun.inf rundll32.exe File created \??\O:\AutoRun.inf rundll32.exe File created \??\Z:\AutoRun.inf rundll32.exe File created \??\R:\AutoRun.inf rundll32.exe File created \??\Y:\AutoRun.inf rundll32.exe File created C:\AutoRun.inf rundll32.exe File created F:\AutoRun.inf rundll32.exe File created \??\H:\AutoRun.inf rundll32.exe File created \??\Q:\AutoRun.inf rundll32.exe File created \??\W:\AutoRun.inf rundll32.exe File created \??\G:\AutoRun.inf rundll32.exe File created \??\I:\AutoRun.inf rundll32.exe File created \??\N:\AutoRun.inf rundll32.exe File created \??\U:\AutoRun.inf rundll32.exe File created D:\AutoRun.inf rundll32.exe File created \??\E:\AutoRun.inf rundll32.exe File created \??\J:\AutoRun.inf rundll32.exe File created \??\P:\AutoRun.inf rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30 PID 2708 wrote to memory of 2860 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc857bb077bf663898f15e0fab8b5db5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc857bb077bf663898f15e0fab8b5db5_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6