Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
32be3e40b704958924209f140a1e403c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32be3e40b704958924209f140a1e403c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32be3e40b704958924209f140a1e403c_JaffaCakes118.dll
-
Size
33KB
-
MD5
32be3e40b704958924209f140a1e403c
-
SHA1
7b21114da617b55dda2a0e80fda4950f05504774
-
SHA256
959bf016e699c3e7ebd0ee20ef7da8cdfb55893f511b3e4d23b31b3571491622
-
SHA512
83ebbf2aaa4e090d2b666b507b9a76c9f6ec0778fad091955c5536662fdc56825209aa22f3fa3f5c6c522a16dfb144705b72008eda6bec66e783fa4cda118edb
-
SSDEEP
768:4wRslJKTFf688AxeiRo95y47HwRxeSmmzxmG:dRssf68dxetq472Mazx7
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1108 rundll32.exe 1108 rundll32.exe 3928 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\xxyvvVNd.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xxyvvVNd.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\xxyvvVNd.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32\ = "C:\\Windows\\SysWow64\\xxyvvVNd.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1108 rundll32.exe 1108 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe 3928 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1108 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1108 1740 rundll32.exe 80 PID 1740 wrote to memory of 1108 1740 rundll32.exe 80 PID 1740 wrote to memory of 1108 1740 rundll32.exe 80 PID 1108 wrote to memory of 612 1108 rundll32.exe 5 PID 1108 wrote to memory of 3928 1108 rundll32.exe 81 PID 1108 wrote to memory of 3928 1108 rundll32.exe 81 PID 1108 wrote to memory of 3928 1108 rundll32.exe 81
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32be3e40b704958924209f140a1e403c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32be3e40b704958924209f140a1e403c_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\xxyvvVNd.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD532be3e40b704958924209f140a1e403c
SHA17b21114da617b55dda2a0e80fda4950f05504774
SHA256959bf016e699c3e7ebd0ee20ef7da8cdfb55893f511b3e4d23b31b3571491622
SHA51283ebbf2aaa4e090d2b666b507b9a76c9f6ec0778fad091955c5536662fdc56825209aa22f3fa3f5c6c522a16dfb144705b72008eda6bec66e783fa4cda118edb