Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
8495f179b7ef1be19104f81ecbcec94d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8495f179b7ef1be19104f81ecbcec94d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8495f179b7ef1be19104f81ecbcec94d_JaffaCakes118.dll
-
Size
133KB
-
MD5
8495f179b7ef1be19104f81ecbcec94d
-
SHA1
7459fe5875a169e19b7d4d2fd3a17e3cfbcf8d5f
-
SHA256
b50f48dae2d38e8ebceaf67193264677e37263734a03632ac51c8e50f4bc06e3
-
SHA512
b5db7365e92c92d7cf314d260950b288aad6faa30576c9369d654059ed7b81e8a01d699a2c2560f2ffd6542b2c5fde45228502781991b2218685bb70cd57bbad
-
SSDEEP
3072:I0wpqFegLt9a46GT40hAzJLv2jW//0Myx9yFr:I0RFegLtjMA2FvCW//0Dxo
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NSTOP\Parameters\ServiceDll = "C:\\Program Files (x86)\\Common Files\\System\\update.log" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1508 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\update.log rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\System\update.log rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4356 1508 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2204 rundll32.exe 2204 rundll32.exe 1508 svchost.exe 1508 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2204 rundll32.exe Token: SeCreateGlobalPrivilege 1508 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2204 2976 rundll32.exe 84 PID 2976 wrote to memory of 2204 2976 rundll32.exe 84 PID 2976 wrote to memory of 2204 2976 rundll32.exe 84 PID 2204 wrote to memory of 2376 2204 rundll32.exe 86 PID 2204 wrote to memory of 2376 2204 rundll32.exe 86 PID 2204 wrote to memory of 2376 2204 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8495f179b7ef1be19104f81ecbcec94d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8495f179b7ef1be19104f81ecbcec94d_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\240607250.BaT3⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k NSTOP -s NSTOP1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 7322⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1508 -ip 15081⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD53935c85fcc4b2a26138af8790a9e39cd
SHA14a1610818f9a59f8a87acdd421d6ac0ab6e3c611
SHA2567a709272471e2c732d97e33f731dd37976c1cf4b27e71901e5f3633c5d61f372
SHA5121323b9d5ec43d35dbcef352e5383e4492035fdbb8b2d758f8db7a907074f772b043e9b64925c17a6da14b023c02025bff3a1affeeecb0f9826ceb1dad7b88f01
-
Filesize
133KB
MD58495f179b7ef1be19104f81ecbcec94d
SHA17459fe5875a169e19b7d4d2fd3a17e3cfbcf8d5f
SHA256b50f48dae2d38e8ebceaf67193264677e37263734a03632ac51c8e50f4bc06e3
SHA512b5db7365e92c92d7cf314d260950b288aad6faa30576c9369d654059ed7b81e8a01d699a2c2560f2ffd6542b2c5fde45228502781991b2218685bb70cd57bbad