Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
69979c1d3d8bee9e97aa43a243093244_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69979c1d3d8bee9e97aa43a243093244_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
69979c1d3d8bee9e97aa43a243093244_JaffaCakes118.dll
-
Size
310KB
-
MD5
69979c1d3d8bee9e97aa43a243093244
-
SHA1
a899f6790eff33dc55dc056cf54f01b772c4c0ba
-
SHA256
58cc487547e8290c438995bbdef02ba06660fab0c279875964929a621b3ae846
-
SHA512
97d3045ee27728023f2533fd5a0b1795b649ff35f25836f1fb23c244a457fe483c121d3b5254e7ee3f8da2f361cfc5e87d2bf7a910e8649888203f45e5dae881
-
SSDEEP
6144:2S9ovbS/diEviu93AYJiFWUAsrKEvcy9IrzgpHqxTRwr:1sm8UH93ABAWKU9IgdGOr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00360039003900370039006300310064003300640038006200650065003900650039003700610061003400330061003200340033003000390033003200340034005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28 PID 3068 wrote to memory of 2200 3068 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69979c1d3d8bee9e97aa43a243093244_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69979c1d3d8bee9e97aa43a243093244_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200
-