Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 12:24
Behavioral task
behavioral1
Sample
1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll
-
Size
787KB
-
MD5
1a1b268d10ffcdc3200a42370ce7ac99
-
SHA1
ddcf5b4e5350f6af84f1f35072e887909c538157
-
SHA256
fddd8a1155040392de6207873bb353228237ae61f0026a35dba6efd5fdf3329e
-
SHA512
82558bbc7f48de0a8a3c5f1eb7d70acb5a06957bc35cda2632c0b22e5503fc21f7e22eab9c5e9d5b7fbef40adf9341209f5eae41a533f6fdfd5ba61e5ef10498
-
SSDEEP
12288:Q7Cx0aLl21dgY5Ax5q09jpZ4AAf4jB5th6ZgvkoSVRDFLJ+3Y4:Q7Cx7Ll21+g+j1Bd6ZgvwhG3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 2356 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1684 rundll32.exe 1684 rundll32.exe -
Processes:
resource yara_rule \Windows\SysWOW64\rundll32mgr.exe upx behavioral1/memory/1684-9-0x0000000010000000-0x0000000010381000-memory.dmp upx behavioral1/memory/1684-2-0x0000000010000000-0x0000000010381000-memory.dmp upx behavioral1/memory/2356-13-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1684-10-0x0000000010000000-0x0000000010381000-memory.dmp upx behavioral1/memory/1684-22-0x0000000010000000-0x0000000010381000-memory.dmp upx behavioral1/memory/2356-21-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
rundll32mgr.exepid process 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 23 IoCs
Processes:
rundll32mgr.exepid process 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe 2356 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32mgr.exedescription pid process Token: SeDebugPrivilege 2356 rundll32mgr.exe Token: SeDebugPrivilege 2356 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exerundll32mgr.exedescription pid process target process PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 1684 2028 rundll32.exe rundll32.exe PID 1684 wrote to memory of 2356 1684 rundll32.exe rundll32mgr.exe PID 1684 wrote to memory of 2356 1684 rundll32.exe rundll32mgr.exe PID 1684 wrote to memory of 2356 1684 rundll32.exe rundll32mgr.exe PID 1684 wrote to memory of 2356 1684 rundll32.exe rundll32mgr.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 388 2356 rundll32mgr.exe wininit.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 396 2356 rundll32mgr.exe csrss.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 436 2356 rundll32mgr.exe winlogon.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 480 2356 rundll32mgr.exe services.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 492 2356 rundll32mgr.exe lsass.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 504 2356 rundll32mgr.exe lsm.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 612 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 688 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 688 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 688 2356 rundll32mgr.exe svchost.exe PID 2356 wrote to memory of 688 2356 rundll32mgr.exe svchost.exe
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\SysWOW64\rundll32mgr.exeFilesize
127KB
MD50ef920d7712d21dda563cab92b29b216
SHA1643c7ae3eb3e8b89cdeba3bbb15604e7f210040c
SHA2567cfaf531184febc33eb4c3de5f9bbeb4d946020ed1ad6b7e3fccefd121dd8e86
SHA512948d74f9b9997354b256fe2b3545a564d5a3683bf274900e92e32d374e2e708685ac1f85d710cf09514cfd9cec4323509fd9598a8620078f074182b384e33bfe
-
memory/1684-10-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/1684-9-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/1684-2-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/1684-17-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/1684-22-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/1684-23-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/1684-12-0x0000000000190000-0x00000000001EB000-memory.dmpFilesize
364KB
-
memory/1684-11-0x0000000000190000-0x00000000001EB000-memory.dmpFilesize
364KB
-
memory/2356-16-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2356-13-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/2356-14-0x0000000077D90000-0x0000000077D91000-memory.dmpFilesize
4KB
-
memory/2356-21-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/2356-19-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2356-15-0x0000000077D8F000-0x0000000077D90000-memory.dmpFilesize
4KB