Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 03:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18a395827424c1d006282a42f0781ad8_JaffaCakes118.dll
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
18a395827424c1d006282a42f0781ad8_JaffaCakes118.dll
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
18a395827424c1d006282a42f0781ad8_JaffaCakes118.dll
-
Size
304KB
-
MD5
18a395827424c1d006282a42f0781ad8
-
SHA1
ce2037b47bda1e55f6b7f0c5fe76b10052ddae5a
-
SHA256
ccfc22ae8928dac4e6d7f3061c2cd784b14e2c9f6076bd19c8aabccb34fd9dc7
-
SHA512
fc43ea51983c8c79c2fcc8770edaa367fcedae9cce8f01d23a66005c03db86693fb3a3216a5786bc115655d77718f63fa78204b7dba534b8bb2bf5fa34a53c18
-
SSDEEP
6144:vehiZznNkGoRN9t4ohakBI7HrLZoOXBwDw:7ZznNkJnhakKPLZoOX+w
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vregfwlx = "{22364B96-F044-491B-B8FA-CE59D9C3886E}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{22364B96-F044-491B-B8FA-CE59D9C3886E}\InProcServer32\ = "C:\\Windows\\vregfwlx.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{22364B96-F044-491B-B8FA-CE59D9C3886E}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{22364B96-F044-491B-B8FA-CE59D9C3886E} rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 912 4920 rundll32.exe 80 PID 4920 wrote to memory of 912 4920 rundll32.exe 80 PID 4920 wrote to memory of 912 4920 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18a395827424c1d006282a42f0781ad8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18a395827424c1d006282a42f0781ad8_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:912
-