Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
ec5496aa3db34f66928dec83bcb73d41_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec5496aa3db34f66928dec83bcb73d41_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ec5496aa3db34f66928dec83bcb73d41_JaffaCakes118.dll
-
Size
1.9MB
-
MD5
ec5496aa3db34f66928dec83bcb73d41
-
SHA1
f4ad818ac23ff1befe7c6747903ba750a59f65a0
-
SHA256
bdc3e204295785efcb7edf8f25f32eeebe853c6e2d91b6caf8d9322c3f5b7c25
-
SHA512
22b6f2cb807b7eccbd1a76d6127c7fdd284ed028d0d39fb87e2597e18c4040d0dfd2580ef201c41253c6c26b09473933f2625b088b2bd6b9e654220f41ebdf08
-
SSDEEP
49152:bnJA77wJ4eMxr3glWQ4eqfsi1u1mTP8H:b+77wJ4lxEJXiFb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2596 ResolutionHost.exe 3836 ResolutionHost.exe -
Loads dropped DLL 2 IoCs
pid Process 2596 ResolutionHost.exe 3836 ResolutionHost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ResolutionHost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ResolutionHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ResolutionHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ResolutionHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ResolutionHost.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\ResolutionHost_1702874162\OUTLFLTR.DAT rundll32.exe File created C:\Program Files (x86)\ResolutionHost_1702874162\rastls.dll rundll32.exe File created C:\Program Files (x86)\ResolutionHost_1702874162\ResolutionHost.exe rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\ResolutionHost .job ResolutionHost.exe File opened for modification C:\Windows\Tasks\ResolutionHost .job ResolutionHost.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ResolutionHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ResolutionHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\CLSID\{AE527AF0-4478-43AE-8F49-6F8B2BC578BF} ResolutionHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{AE527AF0-4478-43AE-8F49-6F8B2BC578BF}\ = 03d8ef5fcfd6b74685a1a8012e7098ad7ac22044a586a245 ResolutionHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ResolutionHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ResolutionHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ResolutionHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ResolutionHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ResolutionHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ResolutionHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3836 ResolutionHost.exe 3836 ResolutionHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3320 4788 rundll32.exe 85 PID 4788 wrote to memory of 3320 4788 rundll32.exe 85 PID 4788 wrote to memory of 3320 4788 rundll32.exe 85 PID 3320 wrote to memory of 2596 3320 rundll32.exe 86 PID 3320 wrote to memory of 2596 3320 rundll32.exe 86 PID 3320 wrote to memory of 2596 3320 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec5496aa3db34f66928dec83bcb73d41_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec5496aa3db34f66928dec83bcb73d41_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\ResolutionHost_1702874162\ResolutionHost.exe"C:\Program Files (x86)\ResolutionHost_1702874162\ResolutionHost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2596
-
-
-
C:\Program Files (x86)\ResolutionHost_1702874162\ResolutionHost.exe"C:\Program Files (x86)\ResolutionHost_1702874162\ResolutionHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD530aa7745b4abfc10fc91df3b34afc600
SHA1e34f07a531f53d07e97a9fecde035b22a12ad1a0
SHA256b8bcdb878f0dce633c6e82b98081d25093e4849e0e37704b614c80383db56e4f
SHA512650ccb3132d587dcd2eec98005f860a9fdc313d3c8acbd4d9ea843686db3191150aec63bbb2b20b99cbc9c2554356965ed18434e4cff98c926278137e41475c7
-
Filesize
355KB
MD5ca954cd8fc2298ba32900187cb5d391f
SHA19ffeea97424f4f6d86004b645246ebfec6d3d37b
SHA25605f90af72c1aeb84e187a4a966ae1be553f0312f66e8fcd53842fb04c8b56b30
SHA51258f4d5bf10fe23858df65849214fba0b5bb85a1cddd3f1f8c420b55cfd05ef6d637de28c7c651546ab4bc2bdcb15c0426afcd3d6aad0c817eeeb5be9c1e35465
-
Filesize
105KB
MD562944e26b36b1dcace429ae26ba66164
SHA12616da1697f7c764ee7fb558887a6a3279861fac
SHA256f9ebf6aeb3f0fb0c29bd8f3d652476cd1fe8bd9a0c11cb15c43de33bbce0bf68
SHA512e3c366044ac0b4df834b2f05d900cad01bc55b39028984ed3486aa2522e8c226bf9a81952da2c7e4bf0bc2c322d10fe58329e787238bb710a137827927b48d7c