Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe
-
Size
92KB
-
MD5
56f0498045bd2fbe5455aec3aa97e6f8
-
SHA1
938fcccd4bae722d42cb9904468bc76c745a6ed0
-
SHA256
aaa9bfb5e45e5b54c49f56e2b7e9dc93607e15042ebf6c6f29ab58e77a6922d2
-
SHA512
f38c06970eaedd28c9de79143675f32d19a4515fe6ea8214231b95baaf4f83af48c2c4e9ea567feeffe5d4a430e806725f34eb25fcbeb70ae17ddfcdde0459c4
-
SSDEEP
1536:qbcP0ZbwwpUvBhHG5WP6h06VPZq30wjoFvMp5uLRbERmeHdik7z49v3P429emKKr:f06Bk4DAQ8yjR2YmKK0GSkWhy+nh
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1660 rundll32.exe 976 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ytevefeqacolalo = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\MinMas.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1660 4576 56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe 84 PID 4576 wrote to memory of 1660 4576 56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe 84 PID 4576 wrote to memory of 1660 4576 56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe 84 PID 1660 wrote to memory of 976 1660 rundll32.exe 96 PID 1660 wrote to memory of 976 1660 rundll32.exe 96 PID 1660 wrote to memory of 976 1660 rundll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56f0498045bd2fbe5455aec3aa97e6f8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\MinMas.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\MinMas.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50d1b0fdf9dd2bb622a9ce0212492cd88
SHA1c6696108e58acac91a73f90aee5236ab89dec484
SHA256b4ef1cb227f4150db84b65c707d4615fe7024958cb5c6c8776b8a281f34b3686
SHA512974316c0f823f1196e13a2a912b8812ff02ef80b89bfe7d1742c33baa7f4d10c8cd73476696acfb76240c18e5d77b42830686bb5a51a5b3616c235c168bfacb7