Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
27c0cc7bdd4d1ca55a6b13a194a0c23c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27c0cc7bdd4d1ca55a6b13a194a0c23c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
27c0cc7bdd4d1ca55a6b13a194a0c23c_JaffaCakes118.dll
-
Size
27KB
-
MD5
27c0cc7bdd4d1ca55a6b13a194a0c23c
-
SHA1
da4141b57936b0e1ec5e1446db7f22e50d22491a
-
SHA256
0a14608caef9db3670d6e9830e2f9fa902f258db28f3b5ca638e9da3a5bcaf6b
-
SHA512
42a4d81c44d235d552d5999e75403999c489b813b6de73cbc5cd8b5ca3dca6161c299c197a28d5d8a768b894680ce1fd0afc676d916fe5093c404a13e6617389
-
SSDEEP
768:jcK+J9zd264iPpE68nrNlqevx09vafZkhOG:oKS9R2Ghwp5IafZkhOG
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scandisk.lnk rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scandisk.dll rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\notepad = "rundll32.exe C:\\Windows\\system32\\notepad.dll,_IWMPEvents@0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "rundll32.exe C:\\Users\\Admin\\ntload.dll,_IWMPEvents@0" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3036 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31 PID 3024 wrote to memory of 3036 3024 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27c0cc7bdd4d1ca55a6b13a194a0c23c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27c0cc7bdd4d1ca55a6b13a194a0c23c_JaffaCakes118.dll,#12⤵
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD527c0cc7bdd4d1ca55a6b13a194a0c23c
SHA1da4141b57936b0e1ec5e1446db7f22e50d22491a
SHA2560a14608caef9db3670d6e9830e2f9fa902f258db28f3b5ca638e9da3a5bcaf6b
SHA51242a4d81c44d235d552d5999e75403999c489b813b6de73cbc5cd8b5ca3dca6161c299c197a28d5d8a768b894680ce1fd0afc676d916fe5093c404a13e6617389