Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
27de7de49be558cf7fa7b42aa6da7941
-
SHA1
068522ed29f251d92cbdd2b6d8501d2bf1753b74
-
SHA256
4725f6712f4d716cb69e8a881406b02512d13640444da40a00bcd47575b5eb9d
-
SHA512
cd4e404cc28f94ae16f3666a2ace608738b09ae0131d484f2a9406ffab664a87b91792b30475516ffde24ce113042beccbe8e59e655fce06627f6e305eb44255
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00Y:SuNZ7Ib8ZBL2/Xb
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\aa103b5add.dll svchost.exe File opened for modification C:\Windows\SysWOW64\aa103b5add.dll svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3916 3348 regsvr32.exe 82 PID 3348 wrote to memory of 3916 3348 regsvr32.exe 82 PID 3348 wrote to memory of 3916 3348 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\27de7de49be558cf7fa7b42aa6da7941_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:3916
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD552ef0d4efa9a9b97e86495f0f8f15996
SHA17eabe1e494a39eeca477b2eadd972ba7a3b7391b
SHA256039c90acbe1afbb6ec7cef7c735f7db56dbb7636f27fcfa8608adbbae1b387e7
SHA5127f3d9f8ced9b58144c7af132521c9ff2922ac8082933463a5c47524e4bb57a1982647a49bff54412309d6b176229b54df0bf12310abc538b8bc12e56d814f3ff
-
Filesize
114B
MD5d3696200a27068a927b573a1208b2c6c
SHA1b1ddfcf678935070e984e81bc8344a3407dc0069
SHA2562d89721de8b3db9bfe4f72a3ee683dec7b206ce49d4eb4fd66704641909fb543
SHA512c685ab03e8886fbfb0f51983c8a7fb3d8e685242cce9dde17d40e504f60ad6b7e4661a2301ca7165d38261b61469fb0144f3201172a26eb9c9b083f0c692ea3e