Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
74a0ccaab31e32912f947d30b9478020
-
SHA1
2dc7c3b54b92c0484d549da3c4a8b58f6c7ee238
-
SHA256
584bbfd86bb3f92d5ee176ab516943966c9339c1dda2063b02a6a7a4cddac746
-
SHA512
88ae7a924cd838adcc35b4b3d2d9b63ee6e9b797c5712234452920bec6c418e8646f4ab0a30c910505fd6d795039996bb235d3aefddbdcbcbddba8ff3e609aa5
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00y:SuNZ7Ib8ZBL2/XR
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2a8fd22daa.dll svchost.exe File created C:\Windows\SysWOW64\2a8fd22daa.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31 PID 588 wrote to memory of 1500 588 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\74a0ccaab31e32912f947d30b9478020_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD505c86b48d45be4f6ec6e1991a0427dee
SHA12f393a8004c4cf13d6efe4073fb88cae1d418d2d
SHA256efaed20b79e242cb94c081242a2a57b237e0e175e5a3dce5856489d5d395c2c7
SHA512a4e0c2873e80098e83fc4d5e919931ad2e0609a48379a78953f641a03fabdb3bfd3c8efc9cc888f8d3ae39cfcb6d8701815729e0f66e0363cb52290417dd90a0