Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll
-
Size
587KB
-
MD5
ff736aab5a06b23896b0963b7623b297
-
SHA1
057eeaed4d25ec32cf3d7e49e3fd3ef052bea182
-
SHA256
6399245c51f9d967b66b2ce351daf5206f2d22be1054caa95d0286ab091dcec6
-
SHA512
9647776cb5b8bd62684e1749d938c9aaee1aba4ca4cebecb4d593ca625bee480619419b67c6cc9db71f1d1895190a2b2aae12547b54962862cd6779c984f6fed
-
SSDEEP
6144:nWp8QVdQxTEZsEcTUOVPCXPMWbrKkZqUKsuGQ9oVIlHInVHNwK7/m//thn4MRfg:1xTMsEcahKkVuoVl9rUVLR
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\g81kt.sys rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{7D9CA4C08213A28533E1DF0B10392378}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\545B.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 5016 regsvr32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1548 1144 rundll32.exe 88 PID 1144 wrote to memory of 1548 1144 rundll32.exe 88 PID 1144 wrote to memory of 1548 1144 rundll32.exe 88 PID 1548 wrote to memory of 5016 1548 rundll32.exe 93 PID 1548 wrote to memory of 5016 1548 rundll32.exe 93 PID 1548 wrote to memory of 5016 1548 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll,#12⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\34BC.tmp3⤵
- Loads dropped DLL
PID:5016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466KB
MD521e645cf1fb09ce41698280eae2e2ebd
SHA1f75097f133652c076e5fc49f72493ea7d2aa6768
SHA256f9ab1db19c0a5393b0b81c8eaa5e8338c58b4fd7f21805ca151b4801d708becd
SHA512433973efbc29e55ae4972045113685430eafb382045a7c77c5d883cfb55bcc0745969afbd2291d6c66b0a5d630ee84d1d0ab2f5b17d2fe48f95b42f18402fedf