Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll
-
Size
450KB
-
MD5
0f54af2eb4f2fe2288964d4c86ba3b2b
-
SHA1
3acd41e2cf37512319bce127a2f033e04e261242
-
SHA256
913ebc4dc55802714c4f110e1630d990e5318deded8496dbcdc2225c23354fc3
-
SHA512
3adbe256d306e2b4246a986c04a1e961a476803c7d30433e9030377a94f871403a0529b72d9366f5ff8ee81f631bbd5c3345cea0e2c29043f574f07cb41a306a
-
SSDEEP
12288:/j9E1EkI9EglDFCoINhC/PwHpFzcSQQFyIBkiqiXMRC:/5E1B8lpp0hqYHpZcSQQiiPXL
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 20 1384 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll\",watch" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll_xserve = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll\",xserve" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe 3608 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3740 4376 rundll32.exe 83 PID 4376 wrote to memory of 3740 4376 rundll32.exe 83 PID 4376 wrote to memory of 3740 4376 rundll32.exe 83 PID 3740 wrote to memory of 3608 3740 rundll32.exe 84 PID 3740 wrote to memory of 3608 3740 rundll32.exe 84 PID 3740 wrote to memory of 3608 3740 rundll32.exe 84 PID 3740 wrote to memory of 1384 3740 rundll32.exe 85 PID 3740 wrote to memory of 1384 3740 rundll32.exe 85 PID 3740 wrote to memory of 1384 3740 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll,#12⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll",watch3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\0f54af2eb4f2fe2288964d4c86ba3b2b_JaffaCakes118.dll",xserve3⤵
- Blocklisted process makes network request
PID:1384
-
-