Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
21b04a59727204b914a3eda03d148900_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21b04a59727204b914a3eda03d148900_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
21b04a59727204b914a3eda03d148900_JaffaCakes118.dll
-
Size
328KB
-
MD5
21b04a59727204b914a3eda03d148900
-
SHA1
19faa14dc859804bdf88ccfb520a6c8118e4f5a8
-
SHA256
bc59e708063e32e5b8cf67f22a5b4c2ff86dddd51ebcf1cd8424c491c3045c63
-
SHA512
775bb669b028788ed2890c11a578cc6dd2e1c32e33aabfab459d0b2236d4ebe788cf1bf6cab73307e9d55339649f70c7836a47c77e7bed5ea0dd33b6f1b9245e
-
SSDEEP
6144:+Ey9AhIWwwhH2bjcxyUgIe8xtND/RHumwOfAysEBojfiyVbVX81ogUgfQDpf3hD:dhI/wEfcs6DZH4wiEBfyJVsq8m53hD
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 4904 wscsvc32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2448 rundll32.exe 2448 rundll32.exe 2448 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2448 rundll32.exe 2448 rundll32.exe 2448 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4904 wscsvc32.exe 4904 wscsvc32.exe 4904 wscsvc32.exe 4904 wscsvc32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 532 wrote to memory of 2448 532 rundll32.exe 81 PID 532 wrote to memory of 2448 532 rundll32.exe 81 PID 532 wrote to memory of 2448 532 rundll32.exe 81 PID 2448 wrote to memory of 4904 2448 rundll32.exe 82 PID 2448 wrote to memory of 4904 2448 rundll32.exe 82 PID 2448 wrote to memory of 4904 2448 rundll32.exe 82 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscsvc32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21b04a59727204b914a3eda03d148900_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21b04a59727204b914a3eda03d148900_JaffaCakes118.dll,#12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5ca0717ec5a42014dc97fd995e2dab8c4
SHA13d24bba19f152efeff203d2b65859c46a354789d
SHA256a8e0d33ab79b3d25224fdf7724eebcf6a0e779b7a3df964119c5a198ed703f0a
SHA512ea098919758ec12b2f15d762febdb23b7f7a5808783a196c31e24ea7c27f4c53c61a4167397f4669ba99d7d8df315762482842ba971eeb0fb730a8be5d825408