Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:27
Behavioral task
behavioral1
Sample
1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe
-
Size
531KB
-
MD5
1686afa0e7dbcd96cb091bd4b4a4a519
-
SHA1
2133859a698b1f78bf9dead44d3f41571e9c0818
-
SHA256
a924b0bf1b61156ce5fb73d1a684197c6156330a4e0ebf6f178e0d50802515d2
-
SHA512
86e76818c77b2ff9c9a863dad3a872ee45a8bc8fd53d90722fd19228d0b07ee4dbc1ea43fc1bcbfa67a6563459ea1bca642157c655f993ae55134d1f03657719
-
SSDEEP
768:wAHAK5abPsgP7tS3wjdfPo+jIy0vk3F4DXm8BiyhWqxpD36N4vxoz86F3c1CT8FL:vabPZSIfPVIy0s1TQijqb3jozDF3Ca8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\t322027.ini 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe File created C:\Windows\SysWOW64\rpcss.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\rpcss.dll rundll32.exe File created C:\Windows\SysWOW64\t322027.dll rundll32.exe -
resource yara_rule behavioral1/memory/2956-2-0x0000000000400000-0x0000000000487000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 2128 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2268 2956 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2268 2956 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2268 2956 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2268 2956 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 30 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2268 wrote to memory of 2128 2268 cmd.exe 32 PID 2128 wrote to memory of 1252 2128 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\~f76bb34.~~~ Inse C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\~f76bb34.~~~ Inse C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe4⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD5bca08fbb14a8a4d4fb746edcc3a32428
SHA1d6f1c0dccb59a776be00d59bf49f0f6969881c86
SHA25629fd8e5e7947c9bf29e9ad61aa176fe98b7c8eb4d226539b027589f29c1f8d62
SHA512305522b472af35bde7707ca4e237b3df69c04e234a56c88036b0b303b63fad781de2c14d466f99af6bdc4f2e982eccaae74ab3ab46b82556fd66bc5d07390e7c