Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
607dfaef3030a5f656f544ec0f890faf_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
607dfaef3030a5f656f544ec0f890faf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
607dfaef3030a5f656f544ec0f890faf_JaffaCakes118.dll
-
Size
24KB
-
MD5
607dfaef3030a5f656f544ec0f890faf
-
SHA1
64860e27cb273f7d78af84c4b69427978e88611f
-
SHA256
469c4a955367a1293aae9246b78735970bf9b7c3879e0732797917cd773d0328
-
SHA512
fa335fef54ca9ed781ae431ce37d854fccde9edbbba999af567d78484fc15d6d3dc5553302c9645b9cc6282c39e1622ca08e61f239924838178ddfaf39d15ccd
-
SSDEEP
768:/pARBR4lucyrPV2cC0i1jWUki8g++DeKvV39xE:/Smkc+PV2t00WUkixpbx
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\linkinfo.dll rundll32.exe File created C:\Windows\twain_86.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 3476 2472 rundll32.exe 84 PID 2472 wrote to memory of 3476 2472 rundll32.exe 84 PID 2472 wrote to memory of 3476 2472 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\607dfaef3030a5f656f544ec0f890faf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\607dfaef3030a5f656f544ec0f890faf_JaffaCakes118.dll,#12⤵
- Maps connected drives based on registry
- Drops file in Windows directory
PID:3476
-