Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
4ca3699b03f898c1664f74369e6edbf0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ca3699b03f898c1664f74369e6edbf0_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4ca3699b03f898c1664f74369e6edbf0_JaffaCakes118.dll
-
Size
316KB
-
MD5
4ca3699b03f898c1664f74369e6edbf0
-
SHA1
ab356c0d3e68e0b88554b868f92c54112a04d042
-
SHA256
dece9137c66f0a9f82c7ea1b466a3a09113dcd2a0efd72190c84c49b15c7cb91
-
SHA512
981f6e9ed5f7729ebe8978db6c9560366689583ee122912706dd1ce1abc7b97e82251aa4249ad88eaa77a18e76ee430a15be713785c68d2c3420605075577d47
-
SSDEEP
6144:j9hPLMSQIVUujms9uPmubcePeVfUTgTbmNlkC6++OhVU:zjXQIDSLvbDPDQCXjS
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 3080 wscsvc32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3080 wscsvc32.exe 3080 wscsvc32.exe 3080 wscsvc32.exe 3080 wscsvc32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4004 wrote to memory of 1656 4004 rundll32.exe 83 PID 4004 wrote to memory of 1656 4004 rundll32.exe 83 PID 4004 wrote to memory of 1656 4004 rundll32.exe 83 PID 1656 wrote to memory of 3080 1656 rundll32.exe 87 PID 1656 wrote to memory of 3080 1656 rundll32.exe 87 PID 1656 wrote to memory of 3080 1656 rundll32.exe 87 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscsvc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ca3699b03f898c1664f74369e6edbf0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ca3699b03f898c1664f74369e6edbf0_JaffaCakes118.dll,#12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\wscsvc32.exeC:\Users\Admin\AppData\Local\Temp\wscsvc32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5867cba2b0e08abbf25545060ebfc0db2
SHA19d5081f2298e5c8a380ef061784b810c0555a2ff
SHA2563e7f243809643c47cc69c70a00c64493b37493d444c7b6b50c63a7d41d0701fa
SHA51210d366cc736d9528ee919d5dfb501d5563d674fac688826d0284f2edac2646ad32c92b00de6e4d1a13981bf85e3f4536954caa24203bc191c09685e94aefd70a