Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
5e4c74f97da60c6549d40e23ab3d60c5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e4c74f97da60c6549d40e23ab3d60c5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5e4c74f97da60c6549d40e23ab3d60c5_JaffaCakes118.dll
-
Size
57KB
-
MD5
5e4c74f97da60c6549d40e23ab3d60c5
-
SHA1
3e5494a46880c25b54b58f5fc0e3c40a100d0d7c
-
SHA256
4b23934ec9c535336f6546c577ebc138f462e2b550ce734c01fa0fc9ac7f2565
-
SHA512
f553c632dfa68950bc8b7cf5a8f3583173f63f92ed446bde1af0e43d271002c2fa4343739afeea1be6086da6d3fbe4d2cd5fb963bde695ea87cf290f47c36b6f
-
SSDEEP
1536:yICeRHvilMHeDP/8tPDWFLIsE1bnuozn3u8lM+eg4x9N/J:B9PGcezQPDWFLIs0DnlMhFN/J
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{tlqmpgcq-jyvu-pfap-hqmu-jnflywibhmkb} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{tlqmpgcq-jyvu-pfap-hqmu-jnflywibhmkb}\StubPath = "C:\\Windows\\system32\\almqe.exe" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4424 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4424 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4424 3768 rundll32.exe 84 PID 3768 wrote to memory of 4424 3768 rundll32.exe 84 PID 3768 wrote to memory of 4424 3768 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e4c74f97da60c6549d40e23ab3d60c5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e4c74f97da60c6549d40e23ab3d60c5_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4424
-