Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
01a98142b184b284e6540f933de8cc31_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01a98142b184b284e6540f933de8cc31_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
01a98142b184b284e6540f933de8cc31_JaffaCakes118.dll
-
Size
164KB
-
MD5
01a98142b184b284e6540f933de8cc31
-
SHA1
aa8cdcb7f1de25bad359e76c9355785210cecf6a
-
SHA256
cd7681c6ca1b1ea41d0cef919d794f20fe89e88518d5b70fd67a1033dad272d4
-
SHA512
4d0b86b18f0cada2ed804ab1c11c6c14e3fcc517c8be35a8c7d221d5b260a596a8e91090d8ef63a665ef8c972b98eba3d697d22794a4cf1ea69a03dbec1b05e9
-
SSDEEP
3072:1xvRNNRig4E1RxegxzkgWO+pglzhqWo2HhjOYLnHxZsakt7ae:3RUDW5WOUgvq52fH4nt73
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\Windows\\system32\\rundll32.exe C:\\PROGRA~3\\jetemfilaso.dat,StartAs" rundll32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\PROGRA~3\jetemfilaso.dat rundll32.exe File opened for modification C:\PROGRA~3\jetemfilaso.dat rundll32.exe File created C:\PROGRA~3\osalifmetej.dat rundll32.exe File opened for modification C:\PROGRA~3\osalifmetej.dat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4608 rundll32.exe 4608 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4608 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 4608 2824 rundll32.exe 91 PID 2824 wrote to memory of 4608 2824 rundll32.exe 91 PID 2824 wrote to memory of 4608 2824 rundll32.exe 91 PID 4608 wrote to memory of 3532 4608 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01a98142b184b284e6540f933de8cc31_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\01a98142b184b284e6540f933de8cc31_JaffaCakes118.dll,#13⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4036,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:81⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5223682680f1668e7d6e40113504d3d6d
SHA1599fcaf38d33f6383599ab7ec16ab808a20fbadd
SHA256df753de2575548e624c81a8b109bb119cec9b94c2e9004ed4f1ab269b147612d
SHA512d193ba5c0f1fa1785bf47ea4bcfa3b5683a3f5dc3af90b2fd03fa2d2add26210e15724a31078eb0da3c7321a531aa809704fd4280783279569cc68e9b869d09a