Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
feb0bf5b0d7f6820c330fa45091cd189_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
feb0bf5b0d7f6820c330fa45091cd189_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
feb0bf5b0d7f6820c330fa45091cd189_JaffaCakes118.dll
-
Size
2.2MB
-
MD5
feb0bf5b0d7f6820c330fa45091cd189
-
SHA1
a1f50429415bc7cbf1706c22dfdca734173fb9ac
-
SHA256
474fe0f75ec639814eac17468c8ce29908ed30f3665457d864cffa6540047ea0
-
SHA512
07f208c66899c0f298037dd8aab4d772e2ef6321a36519112e5d677170a58ee19d69e8a397ae0cb485cc1f2c71d82b55c004d96cf40c459fbda3b405602670f8
-
SSDEEP
24576:52WdDKT6lr1CDu2ruh59hmxxJNOjOAUBJjlD4qH5vlalua2UotfG6o:53DlBEidgxJN5AejlD4uvlab2UotfG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe vchelp.exe" Regedit.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\guFgF0yg.dll rundll32.exe File created C:\windows\SysWOW64\VDHJBG.DLL rundll32.exe File created C:\windows\SysWOW64\WLRUKOUTHLOO.LDO rundll32.exe File created C:\Windows\SysWOW64\guFgF0yg.dll rundll32.exe File created C:\windows\SysWOW64\IJJAQTYACAZX.DLL rundll32.exe File created C:\WINDOWS\SysWOW64\wbem\RPUTKQQQUXRRL.MDA rundll32.exe File opened for modification C:\WINDOWS\SysWOW64\wbem\RPUTKQQQUXRRL.MDA rundll32.exe File created C:\Windows\SysWOW64\arun.reg rundll32.exe File opened for modification C:\windows\SysWOW64\IJJAQTYACAZX.DLL rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2408 Regedit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2340 wrote to memory of 2472 2340 rundll32.exe 28 PID 2472 wrote to memory of 2608 2472 rundll32.exe 29 PID 2472 wrote to memory of 2608 2472 rundll32.exe 29 PID 2472 wrote to memory of 2608 2472 rundll32.exe 29 PID 2472 wrote to memory of 2608 2472 rundll32.exe 29 PID 2472 wrote to memory of 2408 2472 rundll32.exe 31 PID 2472 wrote to memory of 2408 2472 rundll32.exe 31 PID 2472 wrote to memory of 2408 2472 rundll32.exe 31 PID 2472 wrote to memory of 2408 2472 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\feb0bf5b0d7f6820c330fa45091cd189_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\feb0bf5b0d7f6820c330fa45091cd189_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\~Delbat01.bat3⤵PID:2608
-
-
C:\Windows\SysWOW64\Regedit.exeRegedit.exe /s "C:\Windows\SysWOW64\arun.reg"3⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:2408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5ce29ce092d95c693db33cbeaee2aae9b
SHA1848b943115c42dd63e4d4f3b722d39b55276e746
SHA256eb2db8dd6eb8ebc05d9041713dfc40641e57b941e408ee2ac28bf4aea660165c
SHA51266a8b3150bfd276162ab41497619fd25529f30912c412275fc25d56963c2bdae632226d84539562fb85a67083480b11d6bfba3cd2593f47b1ce315568a877aff
-
Filesize
149B
MD5adfc8b71e83fe2857ee9679492f69327
SHA1691d668a9bafd29397d07d40f7a9835c2a69995b
SHA256ce08d9de9b28cee3e147505a99335f3b7f5ab1b82dc009032864c0c1b911cd3c
SHA51213f37167233bf6b00c0f23174e336f7abfbcded6e7bf8d6d5d146459a74f03cfe96a6e414d5ebfe55967be4c02a3f4e6f23cc2c5333180338a45ad7507ced822
-
Filesize
1KB
MD59270fe4dd364e2ecb28d06a79a01e545
SHA1d685712fd0670950322d0b2096ea6c8f72d7399e
SHA25667492e722bb436d328daab8e75325599ae95b14164ccf2d2804ee1f48a2c5789
SHA512849b4bb9823be7e9e8d46a4cfc94e5dfceaddfa32d4646b18137d0e52d57e3c9444a441f788d9dd6d407756c4fa00d8452c49a3b6e28dc9154a55c17fbc9837f