Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 11:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fa2e0929127f8ecdf1c211ad0f33d95d_JaffaCakes118.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa2e0929127f8ecdf1c211ad0f33d95d_JaffaCakes118.dll
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
fa2e0929127f8ecdf1c211ad0f33d95d_JaffaCakes118.dll
-
Size
160KB
-
MD5
fa2e0929127f8ecdf1c211ad0f33d95d
-
SHA1
4f4fc3c35faceec572adeab27850786a3c20ddf5
-
SHA256
63b1620ed230ac3160712debaf3394b1afd417e5045fcce25f8ed8986805f035
-
SHA512
f8b25be9ddea06c26208c0edc5b3c1c6ddad6cd6ba0123658c8f78ffd8c7b94dabdede13ce4d45687fb33fee1d26256f1fc68e0212b7ecbbc5c3cb39c25334e1
-
SSDEEP
3072:WWSXHuUZ+7ZcX1CXzm2GqkxQz26nA+lAjtsuo2tNW7e:Wt3pZ+7KFw0Tkojtm6W6
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\mpfanvqg = "{AAE70BEB-6C26-4F01-8C39-79C198C3A793}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAE70BEB-6C26-4F01-8C39-79C198C3A793}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAE70BEB-6C26-4F01-8C39-79C198C3A793} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAE70BEB-6C26-4F01-8C39-79C198C3A793}\InProcServer32\ = "C:\\Windows\\mpfanvqg.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28 PID 2804 wrote to memory of 2812 2804 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa2e0929127f8ecdf1c211ad0f33d95d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa2e0929127f8ecdf1c211ad0f33d95d_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2812
-