Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
8e9727506238f5da8b0c1c5d69c260ff_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8e9727506238f5da8b0c1c5d69c260ff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8e9727506238f5da8b0c1c5d69c260ff_JaffaCakes118.dll
-
Size
133KB
-
MD5
8e9727506238f5da8b0c1c5d69c260ff
-
SHA1
1c6f83f7ec5c6aeb114ce74a747a813c5126efe6
-
SHA256
821d2fca9710338125df161189f88d8072c2a2b5cbda632cd1736e40492ad264
-
SHA512
5fe41b07ee620e70895afa8ba3d7009f0bfccf36a46c290e307b568581f895ee15d91c128c54db9742a8bc1146eddcfa04ffeaf48f518aa368df4fa0f79f9a82
-
SSDEEP
1536:35lcsVofIpzt4yLrJkXW8Qs5mf5MGaLcrhZnHxylJfnyLvLV+mSg0H:3/csqgj4SJkmVRfrDRyATMmK
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Fax\Parameters\ServiceDll = "C:\\Windows\\system32\\faxsvc.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\faxsvc.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\faxsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 5040 4920 rundll32.exe 84 PID 4920 wrote to memory of 5040 4920 rundll32.exe 84 PID 4920 wrote to memory of 5040 4920 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e9727506238f5da8b0c1c5d69c260ff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e9727506238f5da8b0c1c5d69c260ff_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5040
-