Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
3f5e18655426b5ffc62d65048187dfdc_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f5e18655426b5ffc62d65048187dfdc_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
3f5e18655426b5ffc62d65048187dfdc_JaffaCakes118.dll
-
Size
276KB
-
MD5
3f5e18655426b5ffc62d65048187dfdc
-
SHA1
b785e3e416fe5a64dd518cefc1df2e8bb39e534e
-
SHA256
1dda49ee9286f6c433dd46056c690d02d2e7dea1f96e01dbe148136891d01bbd
-
SHA512
37d23977d2a36e30088a41236937b60a8b1173b44571e71213c78e9df335abfc5bbcc9986b77f508ac5dd5f61f3e0433bbbe7e11496947fa5a7378a66eefcd95
-
SSDEEP
6144:7wKFfRUgx14SK2OyUGrHUw5JTBqmQPYUHeGgXUaOtsBV1RLA:77i+14SxCCHUwhVQAU7gkaGsb
Malware Config
Extracted
zloader
10/03
https://dhteijwrb.host/milagrecf.php
https://aquolepp.pw/milagrecf.php
-
build_id
80
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ewkaepe = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Bohiki\\uryn.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2040 set thread context of 2568 2040 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2568 msiexec.exe Token: SeSecurityPrivilege 2568 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2040 2988 rundll32.exe rundll32.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe PID 2040 wrote to memory of 2568 2040 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5e18655426b5ffc62d65048187dfdc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f5e18655426b5ffc62d65048187dfdc_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2568