Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:09
Behavioral task
behavioral1
Sample
25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll
-
Size
34KB
-
MD5
25ec5b39182046420da328c3e87e9e68
-
SHA1
73e47e93062d6276140fb2464d9a193341851d7a
-
SHA256
c9b1eff5da871c0bd6379adfe9c78f7e382564709c1ffb3f4a0f1978f7c859f9
-
SHA512
a072cc9c2d54c195d825c838c11e5db675c89431f6ee1c9a0869e03a0cc2a809621043d457755003a6264505400ee787f50f363ea5ab0d0ed57ec96e83ca3cec
-
SSDEEP
768:W4sXwpt0tslrEHgMHuZKiD4q77WZmCO1l3ok8GVwnbcuyD7UQfK:WrEtMQEdu8qRCA8uwnouy8QfK
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0005000000022f01-4.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 4228 rundll32.exe -
resource yara_rule behavioral2/memory/3668-0-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/files/0x0005000000022f01-4.dat upx behavioral2/memory/4228-6-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/3668-7-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/4228-8-0x0000000010000000-0x000000001001E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msisue.dll rundll32.exe File opened for modification C:\Windows\msisue.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 4228 rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll,1314612079,-292861188,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1812 wrote to memory of 3668 1812 rundll32.exe 78 PID 1812 wrote to memory of 3668 1812 rundll32.exe 78 PID 1812 wrote to memory of 3668 1812 rundll32.exe 78 PID 3668 wrote to memory of 4228 3668 rundll32.exe 79 PID 3668 wrote to memory of 4228 3668 rundll32.exe 79 PID 3668 wrote to memory of 4228 3668 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25ec5b39182046420da328c3e87e9e68_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msisue.dll",_RunAs@163⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD525ec5b39182046420da328c3e87e9e68
SHA173e47e93062d6276140fb2464d9a193341851d7a
SHA256c9b1eff5da871c0bd6379adfe9c78f7e382564709c1ffb3f4a0f1978f7c859f9
SHA512a072cc9c2d54c195d825c838c11e5db675c89431f6ee1c9a0869e03a0cc2a809621043d457755003a6264505400ee787f50f363ea5ab0d0ed57ec96e83ca3cec