Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe
-
Size
49KB
-
MD5
12015299ab4645aae7f99d4516a0dd3c
-
SHA1
d8b2a29bb6a2924e382f7546827ac5437f705a89
-
SHA256
659918f9b61c39cce96be45969d809fbf096b9c25a9c3cd2f8db583978436c1a
-
SHA512
c5c0d48bf1ded83155bdab796ee268ef028be065b3e818124c710c50c15deac3da168e7b04629580c7b29e8b39e5786cabc917cd5416147b50f556357014ea4b
-
SSDEEP
768:FnAYThnRJfc3O9wVI+dOaRbYxZCHfsNqmBJHXnNKbqKB9ntasFS6rjnBusNn9BxI:FAkk3fLpRbYnKcZXnNCJB/EwBug9z1q
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 28 4508 rundll32.exe 34 4508 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 4508 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\iifgHaaY.dll,#1" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iifgHaaY.dll 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe File created C:\Windows\SysWOW64\iifgHaaY.dll 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe File created C:\Windows\SysWOW64\ssqRKeda.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ = "C:\\Windows\\SysWow64\\iifgHaaY.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe 4508 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 676 wrote to memory of 616 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 5 PID 676 wrote to memory of 4508 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 90 PID 676 wrote to memory of 4508 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 90 PID 676 wrote to memory of 4508 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 90 PID 676 wrote to memory of 4960 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 91 PID 676 wrote to memory of 4960 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 91 PID 676 wrote to memory of 4960 676 12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe 91 PID 4508 wrote to memory of 2716 4508 rundll32.exe 93 PID 4508 wrote to memory of 2716 4508 rundll32.exe 93 PID 4508 wrote to memory of 2716 4508 rundll32.exe 93
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\iifgHaaY.dll,a2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\ssqRKeda.dll",s3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\khfDwtrq.bat "C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87B
MD593d56922d7c4815cbad2b701bcab179e
SHA1f74a1b3c166f69a0f2409943786c0fbbe6cd77b7
SHA25689f976a695b6e64721f2e9a7715a21e628fe8506a908051f75db888403557037
SHA51208d690e62c6246fec8664f0876cf0b16cdbbcd9452e6d7bf011a1d4b6de91276e3cb9b2ae7cd9f0adf3a7219b96d3cbc177701d5019d443961c77ff32baf0fd2
-
Filesize
36KB
MD511fef9151eacaddbcdbf60505bcfbb01
SHA1afc20ada5a71726e90557fbca4d41aa66fb42d56
SHA256a83b51bf8a27ef34f27c2da99d9d0e74ff2672c50b8c289b229d27bfe92208db
SHA512066f4b8f84e5197191694bf5312e7ad9795f8a418b6227dcbd57f992af4f8fc36122472c7bfac54efc7aea1f257928da33291f0d44472ec63528ace208eb4f6d
-
Filesize
1KB
MD5119cc56e37e487451a8d8154da9a12aa
SHA177271fce7fff231f2bdc43ec6d5d4c438a49462c
SHA256590b41a47419aa20bfe288c9a33b647952ff6dad47902adbfeee65936e1a471a
SHA512369af5ef0ef0e1e16fe97711e9ec70071f536429bc101307aef3c0e42aef3836ec35f786626c00d0c6e136b315e07f8795fc576080af48ccf1e3303d8eaa8d64