Analysis
-
max time kernel
145s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe
-
Size
215KB
-
MD5
3848cfe0323c7d0c0b387da1cd4288e3
-
SHA1
771f625eff6c6a2c4c0811c89397c8c4457c86ea
-
SHA256
8831a010001a75278392466476405a8df640db0f9dd0c16f2ab2573c163043a8
-
SHA512
cff61970cb51cb734e51c695bc0fbb9c32383ace2a521517262692fc7e3305e7106cea3d6984ff9e6fe660ab20702d3c263248b6d8d4d1be041c84e276c4f748
-
SSDEEP
3072:i2zyp8caP5sqvUd0EuoBtLM4GzsX12vQTDdfON9YJbF0c1ZG7CO1zO6KIgaIm95:bzIpo1Ud0EuktLwiDdEcBU7ZC6VgaIm
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2272 2528 3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3848cfe0323c7d0c0b387da1cd4288e3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD597dde881aa424a464674707931674478
SHA1c62e17a77ddc5d0f438239e8d518501b7c7bc474
SHA256735a9ed5961dccbda082d85a1c117dd910db6d9b524a605fe60e02b57a66b8ac
SHA5122c3f2cfd3e8df9882ad6184bd5ce5c5a440a50f80010ca4bca3795ac43f7ba969e5dd2c898ac014c7b6f3fb17f87f2363b56e33b8bfd5f702e93eecfe2bd3f65