Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
fc454ad3a691a178a48a0bfe874e6774_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc454ad3a691a178a48a0bfe874e6774_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fc454ad3a691a178a48a0bfe874e6774_JaffaCakes118.dll
-
Size
63KB
-
MD5
fc454ad3a691a178a48a0bfe874e6774
-
SHA1
cb1ce7912232011f58bde6adde6b275717864546
-
SHA256
04b8c86b3e560eb907cc2f887df1330dfedc422a0ed0393041899c4fc93c8bcf
-
SHA512
720e2d9aeb2d7f98afc050e2980f737726b9a3d3b30741cdace5029ac3338fca1b55acaebfe2d987b042c25c230065646291c24db1ff5d8a8937e5d1a68b8d43
-
SSDEEP
768:tdGvJuh51O/szqazvtUas2vBJ32OF9QGtz/XMYppmzoapOGcIqAN8pFrKD0BuTlb:tchqbzZtFf8Ul5acGAIIGDlk6l
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MediaCenter\Parameters\ServiceDll = "C:\\Windows\\system32\\system.ocx.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3708 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.ocx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\system.ocx.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 112 4768 rundll32.exe 92 PID 4768 wrote to memory of 112 4768 rundll32.exe 92 PID 4768 wrote to memory of 112 4768 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc454ad3a691a178a48a0bfe874e6774_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc454ad3a691a178a48a0bfe874e6774_JaffaCakes118.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:112
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4012 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5fc454ad3a691a178a48a0bfe874e6774
SHA1cb1ce7912232011f58bde6adde6b275717864546
SHA25604b8c86b3e560eb907cc2f887df1330dfedc422a0ed0393041899c4fc93c8bcf
SHA512720e2d9aeb2d7f98afc050e2980f737726b9a3d3b30741cdace5029ac3338fca1b55acaebfe2d987b042c25c230065646291c24db1ff5d8a8937e5d1a68b8d43