Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe
-
Size
208KB
-
MD5
2a09ba0a074c207107c96d8550ddf4fa
-
SHA1
ab0a5ae9a854feedd916ef78a3ee00deab425d4b
-
SHA256
e70c6e3f61325209ae97e13a9f578c9b0a7f76d676d5681fe0f487afdbde3f9c
-
SHA512
0023445e61b681a37494085849ecf153916e11543f074cd3ce1fa6dc34e60db84aaf6dbe9ac4996efa684235e636cfafec3b05414a107a454aec275608f27cdf
-
SSDEEP
6144:Xppp5acPkDjvNmE8i7wJvmK1h8QnZ4evG8VFk:XecPkDLgPuwsK4QnZ3G4k
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2800 2648 2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a09ba0a074c207107c96d8550ddf4fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD551e32d6a38fea363ab365c1c406ba393
SHA120d075481344622903ba77f5201b1a04de3a3236
SHA256343f69ad534ce101ed065be19647de35a3edabf7bfc2747e617efe8bcfb34191
SHA51244fd170de336bd7b1f9acb1cb70a33011d4929a88effd5ed98b4f6da9b9c8596bf662f5d01b153cc2c7ed778efe7acecd2f137ba4cb65c491fccf38a40322083