Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll
-
Size
120KB
-
MD5
72dc755db3ce78e8636f3dd19fb600ec
-
SHA1
9f865d71a5e66e99caa5adec40a2f165dbd84340
-
SHA256
9209cf18d0e128f0c5d099e597cfcea3a4768d98ffca9f7958de3df58b7ea164
-
SHA512
c08abf632401b7666bf71a59359cb9a3eb67e0320a94800b52715b49cef7c77d3990aea6a5e58030061dc87ca1ef8f373900db2001163e92140a1fdb5a07cd42
-
SSDEEP
3072:WCMFL3JEwlAwUj2mYkGBEBIpFy3E6f1uXmr71:kOwlGWgaF2X1
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\UPnPDynamicContentSource = "{eb0c255f-3e63-427e-b548-53743c24bf78}" regsvr32.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\UPnPDynamicContentSource\UPnPDynamicContentSource.dll regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{eb0c255f-3e63-427e-b548-53743c24bf78} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{eb0c255f-3e63-427e-b548-53743c24bf78}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{eb0c255f-3e63-427e-b548-53743c24bf78}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\UPnPDynamicContentSource\\UPnPDynamicContentSource.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{eb0c255f-3e63-427e-b548-53743c24bf78}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2316 regsvr32.exe 2316 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2316 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29 PID 2296 wrote to memory of 2316 2296 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD572dc755db3ce78e8636f3dd19fb600ec
SHA19f865d71a5e66e99caa5adec40a2f165dbd84340
SHA2569209cf18d0e128f0c5d099e597cfcea3a4768d98ffca9f7958de3df58b7ea164
SHA512c08abf632401b7666bf71a59359cb9a3eb67e0320a94800b52715b49cef7c77d3990aea6a5e58030061dc87ca1ef8f373900db2001163e92140a1fdb5a07cd42