Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
753d5762cdfb2c7ec8a80b4880fcffa6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
753d5762cdfb2c7ec8a80b4880fcffa6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
753d5762cdfb2c7ec8a80b4880fcffa6_JaffaCakes118.dll
-
Size
168KB
-
MD5
753d5762cdfb2c7ec8a80b4880fcffa6
-
SHA1
ebeb4b383f7591b08e842b5cf41e23d194d3df4e
-
SHA256
5e4ba55bdf56e52a8f02a07e0a80b09ce8b3169f73a178778943b82120cffab7
-
SHA512
418d89ca9a2205d28b32690831789e1aca45ddf645be17c62b08db84a2424be2142c69209e2a7e2f79fc1f63d7df39ed793c9d34379ff09a82de46c789b710f2
-
SSDEEP
3072:NxtOUNkaWcQM9+BCS4CDrrrvQ498ovkPLXGzd3Y2OQQbThvu1kC:NxfQg+ESH/V8ogDIrcbTob
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Windows DNS Services\Parameters\ServiceDll = "C:\\Windows\\system32\\ntservices.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2680 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntservices.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\ntservices.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30 PID 1188 wrote to memory of 2692 1188 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\753d5762cdfb2c7ec8a80b4880fcffa6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\753d5762cdfb2c7ec8a80b4880fcffa6_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5753d5762cdfb2c7ec8a80b4880fcffa6
SHA1ebeb4b383f7591b08e842b5cf41e23d194d3df4e
SHA2565e4ba55bdf56e52a8f02a07e0a80b09ce8b3169f73a178778943b82120cffab7
SHA512418d89ca9a2205d28b32690831789e1aca45ddf645be17c62b08db84a2424be2142c69209e2a7e2f79fc1f63d7df39ed793c9d34379ff09a82de46c789b710f2