Analysis
-
max time kernel
143s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe
-
Size
73KB
-
MD5
2ba489b4603cf60d69c1dcbe66e16402
-
SHA1
29efed75c69959eed8ae92f5920226da96065aa9
-
SHA256
662db986b1ff8e29e1e45511e9887da3b47b34b996b84d220198f20314092b06
-
SHA512
865f14de83bf2869150aef07ad501838a0ddf9a88e74c4f8fca5df4f08b4286cf409dd16c705caf49c1a92d66ac1df311392714019905fa2c633c2d623eb81d0
-
SSDEEP
1536:vUmB2v0zxhWE9TE94kr2PmHYS/tMfORSTlGgN/te:F7zFm4SiOAk2/te
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 10 1380 rundll32.exe 11 4636 rundll32.exe 12 4636 rundll32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 rundll32.exe 4636 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2283880F-EF87-4aac-8EBD-C9BCC8494AF5_46 = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\2283880F-EF87-4aac-8EBD-C9BCC8494AF5_46.avi\", start" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2252 2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe Token: SeDebugPrivilege 1380 rundll32.exe Token: SeDebugPrivilege 4636 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1380 2252 2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe 86 PID 2252 wrote to memory of 1380 2252 2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe 86 PID 2252 wrote to memory of 1380 2252 2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe 86 PID 1380 wrote to memory of 4636 1380 rundll32.exe 87 PID 1380 wrote to memory of 4636 1380 rundll32.exe 87 PID 1380 wrote to memory of 4636 1380 rundll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ba489b4603cf60d69c1dcbe66e16402_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\\c76d4817-ff1b-411f-8ad5-2827e6c2f124\wrkA112.tmp_46", start first worker2⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\\c76d4817-ff1b-411f-8ad5-2827e6c2f124\wrkAA59.tmp_46", start task worker3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD50c82251384a4fe0d214be3f884931e43
SHA1e64d1d4f7d960752ecfe0f5a6a6134f7b79cd544
SHA25674cecbad7f4914ba19709a346d5dba70e1737d05204515cc70cc8a3cbab8cd06
SHA512097538b856a7c86b987bc8b37fa83238c17471b79adac4e6802a6fec5e77ff4477c886524134bdf7d1b4ced69f25733a74d01700ba0489b084c67f35cef1550c