Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b82ae165dea42aa288b1c65a9e7a56d_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b82ae165dea42aa288b1c65a9e7a56d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
5b82ae165dea42aa288b1c65a9e7a56d_JaffaCakes118.dll
-
Size
302KB
-
MD5
5b82ae165dea42aa288b1c65a9e7a56d
-
SHA1
01e59f8bf1242c5257b58ff7dbd6d38eba8a1cae
-
SHA256
40681d069cd6999af598e69c7699c65951eaaee3755084f1362e038fb53c956a
-
SHA512
213916874f6f2eb167848d94bfe54f365072a9086594acc43a5a65d8674bfb122488267088e128f0ad7f7cca28da0f96453651f0a1bb6e1a1418e4bf1ea7ad20
-
SSDEEP
6144:L468zilR2PLm82M8IokoO3Pk7Ynt0XWaF5gRW6/cbr:milR2PL2MmH7YKmaU
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WPDShServiceObj = "{AAA288BA-9A4C-45B0-95D7-94D524869DB5}" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 2160 3356 regsvr32.exe 86 PID 3356 wrote to memory of 2160 3356 regsvr32.exe 86 PID 3356 wrote to memory of 2160 3356 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5b82ae165dea42aa288b1c65a9e7a56d_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5b82ae165dea42aa288b1c65a9e7a56d_JaffaCakes118.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2160
-