Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll
-
Size
375KB
-
MD5
6947ee4228ab808e9c91d9d6cd7f6f21
-
SHA1
006fee40df6b2908d5a6a945fd47ddfe2f32f533
-
SHA256
2558251e3f8705e621bf2749648c77dce391f3cc870aac9a6fd7119ce79103a2
-
SHA512
f8c9618ad79a6b0ac574f59e6d06b8e56b037bd5f388122acc66928e2db913e1630fcd3f92078e53913fab71aaa680968c20be0ecc0f0375fc93a373280b6e8c
-
SSDEEP
6144:sBhX1VLyXidI3XtbNtNjrMUdVMuWVYgneflcVBMYU9ieIRQOHe1itiU4pN1jg:MhXLLyXii3XTTjgSV7W5n97uieILHe1J
Malware Config
Extracted
zloader
CASPAM
CASPAM
http://marchadvertisingnetwork4.com/post.php
http://marchadvertisingnetwork5.com/post.php
http://marchadvertisingnetwork6.com/post.php
http://marchadvertisingnetwork7.com/post.php
http://marchadvertisingnetwork8.com/post.php
http://marchadvertisingnetwork9.com/post.php
http://marchadvertisingnetwork10.com/post.php
-
build_id
24
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ycletyy = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Ocpewu\\tyynq.dll,DllRegisterServer" msiexec.exe -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 4 2656 msiexec.exe 7 2656 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3056 set thread context of 2656 3056 rundll32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2656 msiexec.exe Token: SeSecurityPrivilege 2656 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3024 wrote to memory of 3056 3024 rundll32.exe rundll32.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe PID 3056 wrote to memory of 2656 3056 rundll32.exe msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2656