Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
0515bde50e2933137bf9313bf1ac737b_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0515bde50e2933137bf9313bf1ac737b_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0515bde50e2933137bf9313bf1ac737b_JaffaCakes118.dll
-
Size
192KB
-
MD5
0515bde50e2933137bf9313bf1ac737b
-
SHA1
12f23ec8dbb65c867a4f2749d17c2b02837f468e
-
SHA256
fd9d9940204bada08cb032073e61c463ce8ef51aa506fffd7c5feecfc9666654
-
SHA512
363b6a142a5ad29d2cee27ba165f76f8ffabe0c87818ecc294442da859925cc747dfabb23325c9898d6f1ea96191e03a53d747bd73de88a6ba73c618769fc0e4
-
SSDEEP
3072:dIcwUt9Yw/B50/K27lvfTBf5p0/j6wFgnTzT5t9cdkcasnV9rlsP:nwqP+/KGlvfTBhe/jIdLO9VFlu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\commtel32 = "C:\\Users\\Admin\\AppData\\Roaming\\commtel32.exe" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2008 rundll32.exe 2008 rundll32.exe 2008 rundll32.exe 2008 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 3068 wrote to memory of 2008 3068 rundll32.exe 28 PID 2008 wrote to memory of 2144 2008 rundll32.exe 30 PID 2008 wrote to memory of 2144 2008 rundll32.exe 30 PID 2008 wrote to memory of 2144 2008 rundll32.exe 30 PID 2008 wrote to memory of 2144 2008 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0515bde50e2933137bf9313bf1ac737b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0515bde50e2933137bf9313bf1ac737b_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q "%appdata%\Macromedia\Flash Player\#SharedObjects"3⤵PID:2144
-
-