Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll
-
Size
348KB
-
MD5
3fe173cfc004fef38d2fa2771d9d2bfd
-
SHA1
984cde3a91a0a148ccd8163711952e8b94f2e90f
-
SHA256
01f1dd519b7f9cd0c611ca2e3005be336051df914c218c240869f4640d73286c
-
SHA512
62f20f55e56f4166bd6138cbc352f4b164fbc538fb437d1907f9690607e1223ea090dfa6a74b7e28f60677b12ec399cc8a036a682b7ef1d68e3d11f628bc2cfe
-
SSDEEP
6144:NM1webhOIm2aZ/pB3fUQWTAHsf3v1D22slKrc215dixOyK2wmz5O/W1Vh:um2CbWTkK3hXYKrB5kK2wmzs/W1Vh
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ChineseMSInfo\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll" rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2552 4628 rundll32.exe 83 PID 4628 wrote to memory of 2552 4628 rundll32.exe 83 PID 4628 wrote to memory of 2552 4628 rundll32.exe 83 PID 2820 wrote to memory of 4128 2820 svchost.exe 87 PID 2820 wrote to memory of 4128 2820 svchost.exe 87 PID 2820 wrote to memory of 4128 2820 svchost.exe 87 PID 2552 wrote to memory of 1000 2552 rundll32.exe 88 PID 2552 wrote to memory of 1000 2552 rundll32.exe 88 PID 2552 wrote to memory of 1000 2552 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fe173cfc004fef38d2fa2771d9d2bfd_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\SysWOW64\rundll32.exe" > nul3⤵PID:1000
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "ChineseMSInfo"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\local\temp\3fe173cfc004fef38d2fa2771d9d2bfd_jaffacakes118.dll, Launch2⤵PID:4128
-