Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 15:28

General

  • Target

    74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll

  • Size

    1.1MB

  • MD5

    74a0ccaab31e32912f947d30b9478020

  • SHA1

    2dc7c3b54b92c0484d549da3c4a8b58f6c7ee238

  • SHA256

    584bbfd86bb3f92d5ee176ab516943966c9339c1dda2063b02a6a7a4cddac746

  • SHA512

    88ae7a924cd838adcc35b4b3d2d9b63ee6e9b797c5712234452920bec6c418e8646f4ab0a30c910505fd6d795039996bb235d3aefddbdcbcbddba8ff3e609aa5

  • SSDEEP

    24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00y:SuNZ7Ib8ZBL2/XR

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      • System Location Discovery: System Language Discovery
      PID:1500
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k dtcGep
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\2a8fd22daa.dll

    Filesize

    114B

    MD5

    05c86b48d45be4f6ec6e1991a0427dee

    SHA1

    2f393a8004c4cf13d6efe4073fb88cae1d418d2d

    SHA256

    efaed20b79e242cb94c081242a2a57b237e0e175e5a3dce5856489d5d395c2c7

    SHA512

    a4e0c2873e80098e83fc4d5e919931ad2e0609a48379a78953f641a03fabdb3bfd3c8efc9cc888f8d3ae39cfcb6d8701815729e0f66e0363cb52290417dd90a0

  • memory/1500-0-0x0000000000A50000-0x0000000000B67000-memory.dmp

    Filesize

    1.1MB

  • memory/2344-1-0x00000000025F0000-0x0000000002707000-memory.dmp

    Filesize

    1.1MB

  • memory/2344-9-0x00000000025F0000-0x0000000002707000-memory.dmp

    Filesize

    1.1MB

  • memory/2344-23-0x00000000025F0000-0x0000000002707000-memory.dmp

    Filesize

    1.1MB