Analysis
-
max time kernel
134s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll
-
Size
375KB
-
MD5
6947ee4228ab808e9c91d9d6cd7f6f21
-
SHA1
006fee40df6b2908d5a6a945fd47ddfe2f32f533
-
SHA256
2558251e3f8705e621bf2749648c77dce391f3cc870aac9a6fd7119ce79103a2
-
SHA512
f8c9618ad79a6b0ac574f59e6d06b8e56b037bd5f388122acc66928e2db913e1630fcd3f92078e53913fab71aaa680968c20be0ecc0f0375fc93a373280b6e8c
-
SSDEEP
6144:sBhX1VLyXidI3XtbNtNjrMUdVMuWVYgneflcVBMYU9ieIRQOHe1itiU4pN1jg:MhXLLyXii3XTTjgSV7W5n97uieILHe1J
Malware Config
Extracted
zloader
CASPAM
CASPAM
http://marchadvertisingnetwork4.com/post.php
http://marchadvertisingnetwork5.com/post.php
http://marchadvertisingnetwork6.com/post.php
http://marchadvertisingnetwork7.com/post.php
http://marchadvertisingnetwork8.com/post.php
http://marchadvertisingnetwork9.com/post.php
http://marchadvertisingnetwork10.com/post.php
-
build_id
24
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cuow = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Yqagy\\ohymc.dll,DllRegisterServer" msiexec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 40 4300 msiexec.exe 42 4300 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4480 set thread context of 4300 4480 rundll32.exe 99 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4300 msiexec.exe Token: SeSecurityPrivilege 4300 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4480 1300 rundll32.exe 83 PID 1300 wrote to memory of 4480 1300 rundll32.exe 83 PID 1300 wrote to memory of 4480 1300 rundll32.exe 83 PID 4480 wrote to memory of 4300 4480 rundll32.exe 99 PID 4480 wrote to memory of 4300 4480 rundll32.exe 99 PID 4480 wrote to memory of 4300 4480 rundll32.exe 99 PID 4480 wrote to memory of 4300 4480 rundll32.exe 99 PID 4480 wrote to memory of 4300 4480 rundll32.exe 99
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6947ee4228ab808e9c91d9d6cd7f6f21_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-