Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll
-
Size
29KB
-
MD5
f89f224da16613d170bd28befa5f99b2
-
SHA1
ffaedd22dff4ccb4acb0f37cc753108a5a7a8215
-
SHA256
28d3823d63d0ead1667c0dfa58a56d3c7a3e5635738a6ba1e710efbda4bead2e
-
SHA512
1fc90aef11ad47a25bc4237fe7cdf87d3f7bbc7e60c39480abe700e509be570f7381ae9b5202821405d11e037c2f50df1cfeaa97b77722f800a1c3f9ceaec922
-
SSDEEP
384:e+ELZARmZvLdIi5uaMfYK3zeY25HuvFyOnwK1yeJHM742Num2zhPPh57sgSEcxf2:YZARmRdNWYeiuya3HMJ72zhX4EMfNTE
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Program Files\\Internet Explorer\\rundll32 setupapi.dll,s" rundll32.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4564 wrote to memory of 216 4564 rundll32.exe 82 PID 4564 wrote to memory of 216 4564 rundll32.exe 82 PID 4564 wrote to memory of 216 4564 rundll32.exe 82 PID 216 wrote to memory of 4972 216 rundll32.exe 86 PID 216 wrote to memory of 4972 216 rundll32.exe 86 PID 216 wrote to memory of 4972 216 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll,#12⤵
- Sets file execution options in registry
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\f89f224da16613d170bd28befa5f99b2_JaffaCakes118.dll,#13⤵
- Checks BIOS information in registry
PID:4972
-
-