Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
1924d42b2104f97f86fe257326bc5248
-
SHA1
72066754619adfa32ec9c7771120b4dea9c7d239
-
SHA256
5362094caa0c715081a44cb86a144400c088560573b87345cff4cd40cc4b0534
-
SHA512
855b87638bad6e704d8ce08ab47fe9b61d30ed857ccdc58753896f24f9c5ad9fe4f453bc1b01ea4bba8a40791f61e8b99efe04ec5fce32af73fefa3ab52d58e3
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00a:SuNZ7Ib8ZBL2/Xp
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\26234fb797.dll svchost.exe File opened for modification C:\Windows\SysWOW64\26234fb797.dll svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2004 2020 regsvr32.exe 92 PID 2020 wrote to memory of 2004 2020 regsvr32.exe 92 PID 2020 wrote to memory of 2004 2020 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1924d42b2104f97f86fe257326bc5248_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:2004
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
PID:1940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,8998666007764333392,14724298544432336038,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:81⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD533b943b97e19a697b7fa3556f57282f5
SHA1663a032aa1b0d372ef80fcf47b804d265a2292e1
SHA256a7ca09b45bb05c131a2b9fd16d525eb8357d6844e0690742362c251b6c21cb5e
SHA512f4bd5751502e5f3ec10ff7a717e889fc946e64107fcd6ec32aaf924070435673302e1642678363c349e84aafa018875c3aa3e4f3feb2e08656806ae227e2b7dc
-
Filesize
114B
MD528cc0925f493cb62c15d5185bb3e2d8d
SHA1bda5582f242e4167918b5e9d68f4cbf4750b4930
SHA25612f235d60b4db8a2b1292d40fde31f556594180ef36351a39817a6b788f21756
SHA51247c9b4e1d0a60fad57f2407c68dccbeb0b86ba9f149a74cd716d97fc155fa9cd4d22f1b6b52321592f15370b7b496aa506667dc0e530f473566241d1798420b7