Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe
-
Size
116KB
-
MD5
3bb5958314bee503ca25c8c4cfd5ce17
-
SHA1
438268c278f28a3113bdd86a3af136ae9ecf4932
-
SHA256
a720faa43d831e22ee7ae9191354caed61b5966877098e07ad298264cfe411de
-
SHA512
4b92a4c26acc6a4fe767935cea54c476e07a3c46cb324aa8f942c2fab6437ea9eeec48992e79e0044d60203364ae7de5f5b9f553088c23d822a2a49bf1d1ab19
-
SSDEEP
3072:mttK4gBpFclyM6VRS1hmniy4JdEbgnwlVrgJjG8AHCPKyKSRmZFq:mttip2eRQhmn+JdEbgLTAiOkQF
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2140 rundll32.exe 2140 rundll32.exe 2140 rundll32.exe 2140 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qjumiquyiwifapoy = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\KBOPG2g.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 2740 rundll32.exe 2140 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2740 2852 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32 PID 2740 wrote to memory of 2140 2740 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBOPG2g.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\KBOPG2g.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD541622d035020346a2e7b59d10bb18348
SHA158249c86df7d025128b8558d280d5125b23dc51f
SHA256bb69ac2e8c10a496286984c15bcb030637c6210f8da6f24d5ad711336e66d74f
SHA5125ec04e94ade999019456e0ef231d7dbc8436d18bf601946af09b15621bacf41ccdf0a3df2e8cbdfff833ae229bececb8cff083b8b34b09f71c62add28f9faa8a