Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
3da0fbbbd67f4d5a2714145389aee40b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3da0fbbbd67f4d5a2714145389aee40b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3da0fbbbd67f4d5a2714145389aee40b_JaffaCakes118.dll
-
Size
33KB
-
MD5
3da0fbbbd67f4d5a2714145389aee40b
-
SHA1
7a1e4d8c145ef2a074453d721310997dd56f36f5
-
SHA256
cc3297fc713478d02b169231dc95b20db69a26bb4786d34eb4336bdd209d51f6
-
SHA512
50f7735744fe7396f1681de1b3dee439f969f4a9ccc846248a3c62bcf4e6abfa5e551a5a572a6226338dc2afae90d88a024a95ca947ad1f803e566242c9d1c98
-
SSDEEP
768:iAdVo1OwNMZi9LIj5u0hvVqYgr0ziY9m570vm:iAd8OQMAGnvWY9m10vm
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4048 rundll32.exe 4048 rundll32.exe 1624 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\hgGxVOig.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hgGxVOig.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\hgGxVOig.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCA900CF-450B-4E35-9169-66767F2F9D67}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCA900CF-450B-4E35-9169-66767F2F9D67}\InprocServer32\ = "C:\\Windows\\SysWow64\\hgGxVOig.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCA900CF-450B-4E35-9169-66767F2F9D67}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DCA900CF-450B-4E35-9169-66767F2F9D67} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4048 rundll32.exe 4048 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4048 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4048 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4048 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4048 5060 rundll32.exe 83 PID 5060 wrote to memory of 4048 5060 rundll32.exe 83 PID 5060 wrote to memory of 4048 5060 rundll32.exe 83 PID 4048 wrote to memory of 616 4048 rundll32.exe 5 PID 4048 wrote to memory of 1624 4048 rundll32.exe 89 PID 4048 wrote to memory of 1624 4048 rundll32.exe 89 PID 4048 wrote to memory of 1624 4048 rundll32.exe 89
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3da0fbbbd67f4d5a2714145389aee40b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3da0fbbbd67f4d5a2714145389aee40b_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\hgGxVOig.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53da0fbbbd67f4d5a2714145389aee40b
SHA17a1e4d8c145ef2a074453d721310997dd56f36f5
SHA256cc3297fc713478d02b169231dc95b20db69a26bb4786d34eb4336bdd209d51f6
SHA51250f7735744fe7396f1681de1b3dee439f969f4a9ccc846248a3c62bcf4e6abfa5e551a5a572a6226338dc2afae90d88a024a95ca947ad1f803e566242c9d1c98