Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
27e92ccdc6583195d8121827e4bbf5b3
-
SHA1
e748b51ef7e60b3e942ac3d025c18d85db56dcc8
-
SHA256
1071926622aa1dde8a8ab00f6ad9585e2af3641c0a9e1924395e0cb43ae8ec3b
-
SHA512
963ad025d4b24046096a95c07bc1426ab8208a84921496b1ace21417dac2c355cbeca1b07e59df114e98629a88f90956468f4705768bf60d01724f72f557a8cd
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs003:SuNZ7Ib8ZBL2/XQ
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\7a0ff4a14d.dll svchost.exe File created C:\Windows\SysWOW64\7a0ff4a14d.dll svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3656 wrote to memory of 2856 3656 regsvr32.exe 82 PID 3656 wrote to memory of 2856 3656 regsvr32.exe 82 PID 3656 wrote to memory of 2856 3656 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\27e92ccdc6583195d8121827e4bbf5b3_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:2856
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5452dd943da189d2e7dbb80ed5bc09d5a
SHA15375850aba981455d97b6d6504e54a8b7c03f6cd
SHA2560a57cbbb8adbb7e79be5852248ffe3ac4812e7a968ff2d826bd0bfdf73bcb7ee
SHA512a197c4753c2ac746e69deac4c877adbd2063217e53d36672f0f89e06fb55c1e6975185a7e76cfd21f8bbd8d93d1bd9933c0ef5725361dbccc9c0586e8e448571