Analysis

  • max time kernel
    139s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:46

General

  • Target

    65be5073c6f4834d3d1c73594d97b75d_JaffaCakes118.dll

  • Size

    1.4MB

  • MD5

    65be5073c6f4834d3d1c73594d97b75d

  • SHA1

    06c6bc46067313ccaf0d0dad517f5f216f46b4be

  • SHA256

    ab3e4f1244221a33e4995c6bad5e84a5533c633e7efa51c61fd958803ac5ec14

  • SHA512

    a1f333d5001246ce6443d2203b31af97bc946326453680dd5d5c4f8c9c60ca473f844a1ee565b56ccc618434c794d449aa4f618604ee9a1b227e6203be8310c9

  • SSDEEP

    24576:651RzX5yRZj474urTiFDhRj5m6tYFyIG4SN6u0QHsBQ4oxKy1fumXF:DZj474GOdcG76u0QMBQ4ox5umX

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Windows security bypass 2 TTPs 10 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\SysWOW64\regsvr32.exe" "C:\Users\Admin\AppData\Local\Temp\65be5073c6f4834d3d1c73594d97b75d_JaffaCakes118.dll" /i /n /s:"$$vu6AIFYxhOMk7W6IUZnJFL6hoDmJisMjRHTkfDTGXu_RTVlW5mu_-ZKaZTbMHBLhWPauzn9fBaJc1pwDNAjHZItVo55hv5PjHpk9Iv-lAzaNiCZU0Uc33bpr1oDY6gbC0_4Ejs2iySR7OqCPM8P56ktq2jb-KLSffOvki77arvCqN2JhvqSpzpCWLD1qAjtDOSF4U6SV7c2Dodd59maPgbK7aG5bJR2hkwKGtK87JaJ6lzPp73al6jTSn8Kzew1394Mtb44krmvPCd3fbVpO5FT4WqjcbyoR2Cd_wnvWnd7yAkylni1A6e1qeJGFXMOiaH30ycMirGR6G8xLD3K6g6xh3lzgDL8LKZi_VAIt5SGpTYA7oPRRLJPeVlQICwMNMu0tIwKjN4AGgcThQusHxzNXwvH071eSYoRX3C5Ppi737_6Cf5h7b6Vy2BVnyUu4gybEyhp_AmLwZuswPptzQdDy9sl20d7JWgEqawliQ4QKSd2tZApcGTbFkrFfjQkRXvYhS6NS5gh80-aBMmaS0zB4NELcRaY76yTyhnNY0zMHZoyGgxJVYcBqDNKq_digCAk3S_GQp0Gcg72SIJvY6tkjApvJuoZmSmzJbpefHmRTB7UaTopCOYz_J6m3wcZMN_XdDB1d_EatuAHmxiOGCpbJO-LhlyxnCjlp$$"
        2⤵
        • Windows security bypass
        PID:2668
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\65be5073c6f4834d3d1c73594d97b75d_JaffaCakes118.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\65be5073c6f4834d3d1c73594d97b75d_JaffaCakes118.dll,#1
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Blocklisted process makes network request
        • Maps connected drives based on registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2280
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c for /l %x in (1, 1, 2) do del /Q "C:\Users\Admin\AppData\Local\Temp\65be5073c6f4834d3d1c73594d97b75d_JaffaCakes118.dll" & timeout /t 5
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:620
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            4⤵
            • Delays execution with timeout.exe
            PID:3380
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            4⤵
            • Delays execution with timeout.exe
            PID:2600

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Impair Defenses

    1
    T1562

    Disable or Modify Tools

    1
    T1562.001

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2280-0-0x0000000075091000-0x0000000075177000-memory.dmp
      Filesize

      920KB

    • memory/2280-2-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB

    • memory/2280-1-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB

    • memory/2280-7-0x0000000075091000-0x0000000075177000-memory.dmp
      Filesize

      920KB

    • memory/2668-3-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB

    • memory/2668-5-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB

    • memory/2668-4-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB

    • memory/2668-6-0x0000000075090000-0x00000000751FF000-memory.dmp
      Filesize

      1.4MB