Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll
-
Size
29KB
-
MD5
8d6b3140348e59d1af252e207a57dc02
-
SHA1
b4fb39de9e04ca93043e814eee0a14765ce02b78
-
SHA256
676d160224442e9ed31130ebc5cc13e4676a42a3a2c9a366b8c7643d822faf9e
-
SHA512
f18df57a150b814922fd641183ec6a1eaf1996dcf16352a05a2bc5a1f8735484ed029c7e2b34e60672bbef3e7675eea9f7ee5683b8d7b8c301fac1c47e1eb68f
-
SSDEEP
768:Snn3mSfFMRCQfGan8oFLcJSjM2w6rAJx4Wt6rL:g3tSwQnFLLA2RMJ1t6rL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 100 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cdp3.dll rundll32.exe File opened for modification C:\Windows\cdp3.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 100 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll,1303464799,464025197,-1814625877" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe 100 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1200 4336 rundll32.exe 84 PID 4336 wrote to memory of 1200 4336 rundll32.exe 84 PID 4336 wrote to memory of 1200 4336 rundll32.exe 84 PID 1200 wrote to memory of 100 1200 rundll32.exe 88 PID 1200 wrote to memory of 100 1200 rundll32.exe 88 PID 1200 wrote to memory of 100 1200 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d6b3140348e59d1af252e207a57dc02_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\cdp3.dll",_RunAs@163⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD58d6b3140348e59d1af252e207a57dc02
SHA1b4fb39de9e04ca93043e814eee0a14765ce02b78
SHA256676d160224442e9ed31130ebc5cc13e4676a42a3a2c9a366b8c7643d822faf9e
SHA512f18df57a150b814922fd641183ec6a1eaf1996dcf16352a05a2bc5a1f8735484ed029c7e2b34e60672bbef3e7675eea9f7ee5683b8d7b8c301fac1c47e1eb68f