Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
24a8ed4e0ecb6d6461ec28f853dd32cd
-
SHA1
111e6007e79671a9952571e9fe17d83b96678797
-
SHA256
52f2d2bf3bb7a421c5c161cad139844fa0e228e5b4698b160def07463a2ef696
-
SHA512
6f2c59c283517c6a8a34c93d22605757eb9ec45b8fc204e94587ac295014200296b21068f6514671a7dbba42511699de2f9dec9a2e1964c97e9bccfc8599ec21
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00g:SuNZ7Ib8ZBL2/X/
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\3af4e6b12f.dll svchost.exe File opened for modification C:\Windows\SysWOW64\3af4e6b12f.dll svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 3204 956 regsvr32.exe 81 PID 956 wrote to memory of 3204 956 regsvr32.exe 81 PID 956 wrote to memory of 3204 956 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\24a8ed4e0ecb6d6461ec28f853dd32cd_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:3204
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5a1844209a53054c31547ba7610a74f04
SHA12db63e6cc08b4ca7b12c0f51968c4b98bd5c1a24
SHA256472d679589aec61774f62d3c7e1fc13dc236429171f261fc5190116658f8739a
SHA512537ab0c1c9fdfbee368bf204eb0cc3192596b483fa5d08ec30686e370f8cb0962232c51390671158f41acd779919f4ca4055789a9ea1c251cb77dbddf570955d
-
Filesize
114B
MD5d6cb71ac8b8ac87372a99b8b3496bb2d
SHA14f710b24391c27930abf128784734d838490466e
SHA25656f3f65d1185121307dd210d18ac06271fed5258ae016c85ed53d99b4dcc81d2
SHA512d338b28cf6605e862a901612489dc6de3430357fccf9dd689f0fbb9a35d8697b1201bdcc409b5cc9a61f5a8e967a95df2da76b073c3c703218f6e704db70c20a