Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 23:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8c293fe05b3af514723a1639810c06a3_JaffaCakes118.dll
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
8c293fe05b3af514723a1639810c06a3_JaffaCakes118.dll
-
Size
489KB
-
MD5
8c293fe05b3af514723a1639810c06a3
-
SHA1
ac2f7668c7f3049930b52a83585ac479145cd059
-
SHA256
dbeba2fb33aaba42768a5ed8055cc8ca4009ad1921319f90c78b78d4f0dd9f7b
-
SHA512
2f8db26e93c54b08944a4080e55595f348090086f849fe427f6f07b17a8a57926b1e0d6481356feb0846af0c01ffbb06122750974d3f80e2ea3c465aab1acc23
-
SSDEEP
6144:JQL/CxaPfEDAat201QjWS1weuSMveVva7u0wugLVghTRcWVHaLhU+7bd8AoovvQ5:Ju6uEDr40M6euSMvewSSaGY2ZsYiW
Malware Config
Extracted
Family
zloader
Botnet
bot5
Campaign
bot5
C2
https://militanttra.at/owg.php
Attributes
-
build_id
15
rc4.plain
rsa_pubkey.plain
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Osoxu = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Ytert\\olmauwaz.dll" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 1280 1648 rundll32.exe 93 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1280 msiexec.exe Token: SeSecurityPrivilege 1280 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2620 wrote to memory of 1648 2620 rundll32.exe 81 PID 2620 wrote to memory of 1648 2620 rundll32.exe 81 PID 2620 wrote to memory of 1648 2620 rundll32.exe 81 PID 1648 wrote to memory of 1280 1648 rundll32.exe 93 PID 1648 wrote to memory of 1280 1648 rundll32.exe 93 PID 1648 wrote to memory of 1280 1648 rundll32.exe 93 PID 1648 wrote to memory of 1280 1648 rundll32.exe 93 PID 1648 wrote to memory of 1280 1648 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c293fe05b3af514723a1639810c06a3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c293fe05b3af514723a1639810c06a3_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-