Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
700782d1f441ee60da5651a03ddbc76e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
700782d1f441ee60da5651a03ddbc76e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
700782d1f441ee60da5651a03ddbc76e_JaffaCakes118.dll
-
Size
268KB
-
MD5
700782d1f441ee60da5651a03ddbc76e
-
SHA1
96587fa01aa924e11ff03e08a4c7c7a91b7b3660
-
SHA256
1f19eab84dc288f4312cfb643d4b98d3d2f2aaa9a6d9562182c91ba98b486e62
-
SHA512
9678da15d4831ee119342d3dd5f8ebbc660f4442b3b08ec8ec622bc2f48957e55f835c9626e3afd8180165f19480d1160f8ea73b6374d33984bad1076060d8d5
-
SSDEEP
3072:gRUB/5ju2MHAqtIQQEiOAAmcczH6vj11jsC9TK+GgVQ5RhvVQgsCC+1jLUZcaZt2:i0xKuOAAmcaujPTK+s594E1jJalgR3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\adsoowf = "{7A43DE11-3453-4FAF-81B0-B8B5EE643D2C}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A43DE11-3453-4FAF-81B0-B8B5EE643D2C} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A43DE11-3453-4FAF-81B0-B8B5EE643D2C}\InProcServer32\ = "C:\\Windows\\adsoowf.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A43DE11-3453-4FAF-81B0-B8B5EE643D2C}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30 PID 2988 wrote to memory of 1788 2988 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\700782d1f441ee60da5651a03ddbc76e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\700782d1f441ee60da5651a03ddbc76e_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1788
-