Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll
-
Size
406KB
-
MD5
699ef2cb318463cf40ccb43b026c008f
-
SHA1
580a3087ca9ff60bd1b103265332f9346c2c9fe1
-
SHA256
f39df327fe1c1bea6d7b8d9c9723d5c414e0604c9e3deb3254e4903847738e13
-
SHA512
394b15ee032b7c7968e3faec36b80407e368f8bf40796b7d98946ea7751bac6fe363bc394daa972ff245cadaa0fdaf594915c705801717a5c2cadee585dd1c23
-
SSDEEP
12288:aYwP2g5kEA+KZB/lGrKAvLCpqR6uYLQhpLnht:Y2n+KZNvY1j3Lnht
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\.Net CLR\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 2996 rundll32.exe Token: SeIncBasePriorityPrivilege 2996 rundll32.exe Token: SeIncBasePriorityPrivilege 2996 rundll32.exe Token: 33 2072 svchost.exe Token: SeIncBasePriorityPrivilege 2072 svchost.exe Token: 33 2756 rundll32.exe Token: SeIncBasePriorityPrivilege 2756 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2952 wrote to memory of 2996 2952 rundll32.exe 31 PID 2996 wrote to memory of 2328 2996 rundll32.exe 33 PID 2996 wrote to memory of 2328 2996 rundll32.exe 33 PID 2996 wrote to memory of 2328 2996 rundll32.exe 33 PID 2996 wrote to memory of 2328 2996 rundll32.exe 33 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35 PID 2072 wrote to memory of 2756 2072 svchost.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\699ef2cb318463cf40ccb43b026c008f_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\SysWOW64\rundll32.exe" > nul3⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ".Net CLR"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\local\temp\699ef2cb318463cf40ccb43b026c008f_jaffacakes118.dll, Launch2⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2756
-