Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
17bbce138cf483552d80d5173ab3abf6_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17bbce138cf483552d80d5173ab3abf6_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
17bbce138cf483552d80d5173ab3abf6_JaffaCakes118.dll
-
Size
24KB
-
MD5
17bbce138cf483552d80d5173ab3abf6
-
SHA1
dbba94d291839a7aeaca14be7de594a457eb2041
-
SHA256
e16afe0d4e655437255e9113647a14bd71a32a8269e106232cfd740f7faaa2ed
-
SHA512
7d28b28c3ebd15d732f83d2ed15f66b30b5121ced24bbb563417e8b2d5eade046228e2aa441886f4a132e215c5035680cd823d65d190d1ac198ae350050902c1
-
SSDEEP
384:VW4JURRkGRW89KCPMO3hz6vAyeQfV10XXThrIZcKbwOR0q6Sg/uASCX8:VdU9Rx2Ay5V1W5IZFb9ReduVf
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2604 rundll32.exe 2604 rundll32.exe 456 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\tuvWqQjh.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tuvWqQjh.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\tuvWqQjh.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F11D5D5-3FB2-4ADD-84AD-D69BC9A5D312} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F11D5D5-3FB2-4ADD-84AD-D69BC9A5D312}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F11D5D5-3FB2-4ADD-84AD-D69BC9A5D312}\InprocServer32\ = "C:\\Windows\\SysWow64\\tuvWqQjh.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F11D5D5-3FB2-4ADD-84AD-D69BC9A5D312}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 rundll32.exe 2604 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe 456 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2604 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2604 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2604 4872 rundll32.exe 81 PID 4872 wrote to memory of 2604 4872 rundll32.exe 81 PID 4872 wrote to memory of 2604 4872 rundll32.exe 81 PID 2604 wrote to memory of 620 2604 rundll32.exe 5 PID 2604 wrote to memory of 456 2604 rundll32.exe 84 PID 2604 wrote to memory of 456 2604 rundll32.exe 84 PID 2604 wrote to memory of 456 2604 rundll32.exe 84
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17bbce138cf483552d80d5173ab3abf6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17bbce138cf483552d80d5173ab3abf6_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\tuvWqQjh.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD517bbce138cf483552d80d5173ab3abf6
SHA1dbba94d291839a7aeaca14be7de594a457eb2041
SHA256e16afe0d4e655437255e9113647a14bd71a32a8269e106232cfd740f7faaa2ed
SHA5127d28b28c3ebd15d732f83d2ed15f66b30b5121ced24bbb563417e8b2d5eade046228e2aa441886f4a132e215c5035680cd823d65d190d1ac198ae350050902c1