Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
32aca795f01ec9ef592a5c73403fb3c7
-
SHA1
d34a001a599d9d98b77f2b7a593ba903932d4c86
-
SHA256
89a81578acb8698abff67270bd4841363b56f9758086402fef8e3281f319b51e
-
SHA512
6ce7ab64bf85cb19ee92516a08052b5b31144130756953dd34e9dabf3f48637590cdf9b547d4502252da7520cb7edb87789a38b43056e54e51e6c72dae070494
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00m:SuNZ7Ib8ZBL2/XB
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\deed58d2ac.dll svchost.exe File opened for modification C:\Windows\SysWOW64\deed58d2ac.dll svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30 PID 2124 wrote to memory of 2200 2124 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\32aca795f01ec9ef592a5c73403fb3c7_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
PID:2200
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD55e6ed9452432742b558d22bf4939dd0f
SHA15644b5692061ca459a48272e647138f9678748f9
SHA25637d026ccdd589ebb0d6c12dfe2e825c0145b975b55be8f7b89ec51e31bca5c67
SHA5129d402a9f9389661739b9bc69a1b5bb7408b4f3947bf79beca7c770e1bb7230c6cc8e9288f9d211f66285040868b91860b1cde8dfee8a4f6287fe4438c4090188
-
Filesize
114B
MD5eca4f823cf4dc7649ec8fe692221ab49
SHA12f405b2543e6db6c99d9c6bd222329c0003397d1
SHA256193615058597aadd3af99e6b6653a1ba4065f3d8e152e91e2a7eeb9e1f49a4f4
SHA51268df0e28b4253cca35d05264a5d348f98d660e630fd12a12ebe96d740929dec55c123f6d4fbaae2b593dfc0b4ad53dae9bba7bcb1ba96b7d304ec72837fe4413