Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
-
Size
41KB
-
MD5
886a09768f8eee7ad5580d341ce7bb6a
-
SHA1
598a88002c08c53bae3fa96baf41d77a298fef87
-
SHA256
f7402e1146de9b11953fe2db5032207c5072dec81d6d3d9c341f1bf174d0d4f9
-
SHA512
5e31f6ed58b43f183237a7e2218e0c5d8acc28197dde852087ff46c3f484d55c9c5edb658eee0eec1e8c96686bb81d5cd9d2789712c7b90bf0981f8466ea7cbe
-
SSDEEP
768:HqoeN/bg30M0nv46QKqUT+m3lY76Nh1TPF7+7GquAiDG14j7l8j:H7eN830M0nv46ibSlY78h146qCDGqj7m
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55A11BC1-B32B-EAA2-A12D1-DCA1214B41AC}\stubpath = "C:\\Windows\\hpupdate.exe" rundll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{55A11BC1-B32B-EAA2-A12D1-DCA1214B41AC} rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\hpupdate.rel rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4360 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4360 1248 rundll32.exe 84 PID 1248 wrote to memory of 4360 1248 rundll32.exe 84 PID 1248 wrote to memory of 4360 1248 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4360
-