Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
73626110298d3b426842a568d229f973_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73626110298d3b426842a568d229f973_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
73626110298d3b426842a568d229f973_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
73626110298d3b426842a568d229f973
-
SHA1
41c969ac320c272c172821d5b13e840697409392
-
SHA256
922f9ffedf68aca34e6e141db49d2bfc517ffdeb466faf7b6680b0c3e3d8f00c
-
SHA512
a724355aa29d517d9c2ca60a9177bf53c2b69b0cfb55477a51a93f5ee8a02efac5c2550d03ae3b2ea452c697ec40157c1953ace2b0f2b61fba4f6658c0de5f03
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00r:SuNZ7Ib8ZBL2/Xs
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\73626110298d3b426842a568d229f973_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\2a9c6c831d.dll svchost.exe File opened for modification C:\Windows\SysWOW64\2a9c6c831d.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2036 1756 regsvr32.exe 84 PID 1756 wrote to memory of 2036 1756 regsvr32.exe 84 PID 1756 wrote to memory of 2036 1756 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\73626110298d3b426842a568d229f973_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\73626110298d3b426842a568d229f973_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5bea28bb32b13fa7049ae07d00cf7f3c8
SHA1b1055aed4aedbf85e5835b41ac61c5978898bdf3
SHA256bc5db74e5dc0be9802f24e246390ac27877bcee2248306f0328bf04271455c49
SHA512c3413c7dc2b7b0a80b02447bf0d44de4e76e295b28e9bb1c1bf262880ee52032d9bde57b708e4529493fe4a99f181d4a9176f003faffc71e89417a1d191f1485