Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
0a831e91534fc143d9072b77e77fe250_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a831e91534fc143d9072b77e77fe250_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0a831e91534fc143d9072b77e77fe250_JaffaCakes118.dll
-
Size
282KB
-
MD5
0a831e91534fc143d9072b77e77fe250
-
SHA1
927e62fc0c7fa1c166b872462354ee110feac918
-
SHA256
9669782b3501cdcb1a72eea781a12bde97e23f60e0750f390d8c931142fed00d
-
SHA512
fba38ff4bd81634681bd84878890026a08c8a7e38beedc5b8c13e648d196aa723d2134cab6139b036315a7f4861f3b20611506cbf32a0db932544fabbc0ae951
-
SSDEEP
3072:gHXUE042gtrmBsCO/SNr7U076NDeELn/osyLlTn6xtakOv0wGwuffjqLD:gkZ42YmB8Wrw0mNHGLlj6t8ufrq
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 2012 rundll32.exe 3 2532 rundll32.exe 6 2012 rundll32.exe 7 2532 rundll32.exe 10 2012 rundll32.exe 11 2532 rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Winmgmt\Parameters\ServiceDll = "C:\\PROGRA~3\\2992199F9A\\811sekaCaffaJ_052ef77e77b2709d341cf43519e138a0.faa" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2012-1-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-4-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-6-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-5-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-9-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-8-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-13-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2012-14-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-18-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-19-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-21-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-20-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-15-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-24-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-25-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-28-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2532-31-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-36-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-41-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-53-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-55-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-70-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-89-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-94-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-114-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-140-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-158-0x00000000007B0000-0x00000000007E1000-memory.dmp upx behavioral1/memory/2012-163-0x0000000000230000-0x0000000000261000-memory.dmp upx behavioral1/memory/2532-181-0x00000000007B0000-0x00000000007E1000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\PROGRA~3\2992199F9A\br87roAdmin.fdd rundll32.exe File created C:\PROGRA~3\2992199F9A\or78rb.cpp rundll32.exe File created C:\PROGRA~3\2992199F9A\2193912002.dat rundll32.exe File created C:\PROGRA~3\2992199F9A\811sekaCaffaJ_052ef77e77b2709d341cf43519e138a0Admin.fdd rundll32.exe File created C:\PROGRA~3\2992199F9A\br87ro.bbr rundll32.exe File opened for modification C:\PROGRA~3\2992199F9A\br87ro.bbr rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 rundll32.exe 2532 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2548 wrote to memory of 2012 2548 rundll32.exe 30 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31 PID 2012 wrote to memory of 2532 2012 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a831e91534fc143d9072b77e77fe250_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a831e91534fc143d9072b77e77fe250_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Server Software Component: Terminal Services DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\PROGRA~3\299219~1\or78rb.cpp,work3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD50a831e91534fc143d9072b77e77fe250
SHA1927e62fc0c7fa1c166b872462354ee110feac918
SHA2569669782b3501cdcb1a72eea781a12bde97e23f60e0750f390d8c931142fed00d
SHA512fba38ff4bd81634681bd84878890026a08c8a7e38beedc5b8c13e648d196aa723d2134cab6139b036315a7f4861f3b20611506cbf32a0db932544fabbc0ae951