Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 16:49

General

  • Target

    96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll

  • Size

    1.1MB

  • MD5

    96dd42880a156fa404f4749a8687e3a3

  • SHA1

    ffb124cc5ecda5379faa0c21443b4b3578364eb3

  • SHA256

    c19db458e11bb67f46f45540e4c6a74996141d63e0ea7cd3156d7da158bfe818

  • SHA512

    e8247fb31fcf5e22707603376be1d8db5921643dbc1ad70a93972fdcf0c0125a6254cdf733eaf17b6e4905a1e8af808d766bba38bdf468ced75bbd08845b02e8

  • SSDEEP

    24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00/:SuNZ7Ib8ZBL2/Xk

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll
      2⤵
      • Server Software Component: Terminal Services DLL
      • System Location Discovery: System Language Discovery
      PID:4036
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\f66eafb244.dll

    Filesize

    114B

    MD5

    ead27117dfb20ee05c69db27171809e2

    SHA1

    117e81870101e566058de1ee4e7b846ca1f4a7f3

    SHA256

    0be754a7ea9ecb2e318ebcb0683ffcc284af4aeee59308c087296efee80c87a6

    SHA512

    5728c7f64567f422d10bf68dbae431e2d4cdcdf6a245639d262ca2739b953c6f159c07bbd5a3b5f46cb8743caa384c7cd082ebcb6dd474369875d15e333f0b41

  • memory/3560-0-0x0000000001600000-0x0000000001717000-memory.dmp

    Filesize

    1.1MB

  • memory/3560-8-0x0000000001600000-0x0000000001717000-memory.dmp

    Filesize

    1.1MB

  • memory/3560-32-0x0000000001600000-0x0000000001717000-memory.dmp

    Filesize

    1.1MB