Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
5d6860a98f0a5122b34331a275f3556b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d6860a98f0a5122b34331a275f3556b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5d6860a98f0a5122b34331a275f3556b_JaffaCakes118.dll
-
Size
24KB
-
MD5
5d6860a98f0a5122b34331a275f3556b
-
SHA1
2af844edc64a46cf82f17b4ef20dedb49b733422
-
SHA256
a9f15397512e7ae62b381036d8cf2babb20e391bf1c4145dfcdf03813b94bbba
-
SHA512
511702b455e36023fefbb1153b97ff34c7dfd9743f0f4fa224ba071cd88011ae65fdffa60d767e90d1423dd682878d9058bbfbdc0a11b8d40fb7a0bbad6798eb
-
SSDEEP
384:Zve6kWKQYebBTfN4ZgeEYqpiVHESVviSDbo6dE+oekG802OyG0i02OyG0:ZDKQRjpCTtSUEQpH2OyGy2OyG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe yoyg.guo jaqwe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yoyg.guo rundll32.exe File created C:\Windows\SysWOW64\yoyg.guo rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idid svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\idid\url0 = 1e9b6dd889e6c45673f71278b5effd1615807487dea8984374e9587db6afea5006ef7c3b9b01748723f78ef7f1e0540e svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3736 WINWORD.EXE 3736 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3640 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3736 WINWORD.EXE 3736 WINWORD.EXE 3736 WINWORD.EXE 3736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3640 4544 rundll32.exe 84 PID 4544 wrote to memory of 3640 4544 rundll32.exe 84 PID 4544 wrote to memory of 3640 4544 rundll32.exe 84 PID 3640 wrote to memory of 1512 3640 rundll32.exe 96 PID 3640 wrote to memory of 1512 3640 rundll32.exe 96 PID 3640 wrote to memory of 1512 3640 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d6860a98f0a5122b34331a275f3556b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d6860a98f0a5122b34331a275f3556b_JaffaCakes118.dll,#12⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies registry class
PID:1512
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3736