Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
06fc36f1267f604b356f2f25f80d3f70_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06fc36f1267f604b356f2f25f80d3f70_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
06fc36f1267f604b356f2f25f80d3f70_JaffaCakes118.dll
-
Size
152KB
-
MD5
06fc36f1267f604b356f2f25f80d3f70
-
SHA1
7764cb9fc3f65cac90e07b65ed8acd75402d1042
-
SHA256
6c1b60655c1025dc0098cc979fe73a2e9db9af1906090643de5a985bf2a23861
-
SHA512
1d363aaab8bcdbb757fc3926b161905829404656e89167e74a7fd7c102c638c11c81d82724b93cd1dc709544ab1647d66ed023c611a3cd92d2f602477e69c618
-
SSDEEP
1536:xszmzUP7+QouBhaBRkWmZUyJdfF3Whbp7OBymRaF/i4sKse61+wo2Hy60ngkg8q4:xszmgP7+Qv0BQfFGphGk/iLJo2SWRP
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2424 rundll32.exe 4808 rundll32.exe 5024 rundll32.exe 4832 rundll32.exe 1180 rundll32.exe 1716 rundll32.exe -
Loads dropped DLL 8 IoCs
pid Process 5040 rundll32.exe 5040 rundll32.exe 2424 rundll32.exe 4808 rundll32.exe 5024 rundll32.exe 4832 rundll32.exe 1180 rundll32.exe 1716 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\PROGRA~3\\rundll32.exe C:\\PROGRA~3\\jq6zzd.dat,FG00" rundll32.exe -
resource yara_rule behavioral2/memory/5040-1-0x000000007DD00000-0x000000007DD2B000-memory.dmp upx behavioral2/memory/5040-9-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/2424-18-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/2424-17-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/5040-35-0x000000007DD00000-0x000000007DD2B000-memory.dmp upx behavioral2/memory/5040-37-0x0000000009320000-0x000000000935F000-memory.dmp upx behavioral2/memory/2424-38-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/4808-41-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/4832-42-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1180-43-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1716-44-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1180-66-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1180-73-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1716-79-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1716-104-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx behavioral2/memory/1716-114-0x000000007DD00000-0x000000007DD3F000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\PROGRA~3\dzz6qj.bat rundll32.exe File created C:\PROGRA~3\dzz6qj.reg rundll32.exe File created C:\PROGRA~3\rundll32.exe rundll32.exe File created C:\PROGRA~3\jq6zzd.dat rundll32.exe File created C:\PROGRA~3\as98213.txt rundll32.exe File created C:\PROGRA~3\dzz6qj.js rundll32.exe File created C:\PROGRA~3\dzz6qj.pad rundll32.exe File opened for modification C:\PROGRA~3\dzz6qj.pad rundll32.exe File opened for modification C:\PROGRA~3\dzz6qj.pad rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31134771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8289F9B8-8026-11EF-AC6B-5E50324ADEFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31134771" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31134771" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1458799939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434573810" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1458799939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1471924843" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe 3512 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3512 iexplore.exe 3512 iexplore.exe 3140 IEXPLORE.EXE 3140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4296 wrote to memory of 5040 4296 rundll32.exe 82 PID 4296 wrote to memory of 5040 4296 rundll32.exe 82 PID 4296 wrote to memory of 5040 4296 rundll32.exe 82 PID 5040 wrote to memory of 2424 5040 rundll32.exe 83 PID 5040 wrote to memory of 2424 5040 rundll32.exe 83 PID 5040 wrote to memory of 2424 5040 rundll32.exe 83 PID 2424 wrote to memory of 4808 2424 rundll32.exe 84 PID 2424 wrote to memory of 4808 2424 rundll32.exe 84 PID 2424 wrote to memory of 4808 2424 rundll32.exe 84 PID 2424 wrote to memory of 5024 2424 rundll32.exe 85 PID 2424 wrote to memory of 5024 2424 rundll32.exe 85 PID 2424 wrote to memory of 5024 2424 rundll32.exe 85 PID 2424 wrote to memory of 4832 2424 rundll32.exe 86 PID 2424 wrote to memory of 4832 2424 rundll32.exe 86 PID 2424 wrote to memory of 4832 2424 rundll32.exe 86 PID 2424 wrote to memory of 1180 2424 rundll32.exe 87 PID 2424 wrote to memory of 1180 2424 rundll32.exe 87 PID 2424 wrote to memory of 1180 2424 rundll32.exe 87 PID 2424 wrote to memory of 1716 2424 rundll32.exe 88 PID 2424 wrote to memory of 1716 2424 rundll32.exe 88 PID 2424 wrote to memory of 1716 2424 rundll32.exe 88 PID 4832 wrote to memory of 3512 4832 rundll32.exe 89 PID 4832 wrote to memory of 3512 4832 rundll32.exe 89 PID 3512 wrote to memory of 3140 3512 iexplore.exe 90 PID 3512 wrote to memory of 3140 3512 iexplore.exe 90 PID 3512 wrote to memory of 3140 3512 iexplore.exe 90 PID 4832 wrote to memory of 3512 4832 rundll32.exe 89 PID 4832 wrote to memory of 3512 4832 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06fc36f1267f604b356f2f25f80d3f70_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06fc36f1267f604b356f2f25f80d3f70_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG003⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG014⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG024⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG034⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3512 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3140
-
-
-
-
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG044⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1180
-
-
C:\PROGRA~3\rundll32.exeC:\PROGRA~3\rundll32.exe C:\PROGRA~3\jq6zzd.dat,FG064⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD506fc36f1267f604b356f2f25f80d3f70
SHA17764cb9fc3f65cac90e07b65ed8acd75402d1042
SHA2566c1b60655c1025dc0098cc979fe73a2e9db9af1906090643de5a985bf2a23861
SHA5121d363aaab8bcdbb757fc3926b161905829404656e89167e74a7fd7c102c638c11c81d82724b93cd1dc709544ab1647d66ed023c611a3cd92d2f602477e69c618
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53581a0e6b4a2481b0d17c98cea4c6ba1
SHA1f55e51abdb6324ae363802235297914a053947ec
SHA256a904ea3ed03f1568aaea366c859b6f0610d0e47ccd5725c20132d3c10e11188d
SHA512f9ea3d2712ca7ebb9c5826de7a89c59c7b2a50759baa83cf04fce4234d59e94d251560ab9e3bb845715ce54bc65187297eac9f73ad93adf034bca591cab3ab24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5310557d2fb0bde0a393f9a59da3bc94d
SHA1a7036e115253fbc92d9c9dcdd8f2e2bedb7bf923
SHA256f3abe6ffe385d5a4e8307e10b2695d45f19df4f03770bf02164f8fcbe15d8c05
SHA5124772ec1a0219e33f89ed972112970e26b858d8d666caa1c4c84f227854728d15c144f089f75fd04edc18d8b07f25ec4d7f8c9947ae6129571b6ce11ef5bd8533
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee