Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
96dd42880a156fa404f4749a8687e3a3
-
SHA1
ffb124cc5ecda5379faa0c21443b4b3578364eb3
-
SHA256
c19db458e11bb67f46f45540e4c6a74996141d63e0ea7cd3156d7da158bfe818
-
SHA512
e8247fb31fcf5e22707603376be1d8db5921643dbc1ad70a93972fdcf0c0125a6254cdf733eaf17b6e4905a1e8af808d766bba38bdf468ced75bbd08845b02e8
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00/:SuNZ7Ib8ZBL2/Xk
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\f66eafb244.dll svchost.exe File opened for modification C:\Windows\SysWOW64\f66eafb244.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4036 4148 regsvr32.exe 84 PID 4148 wrote to memory of 4036 4148 regsvr32.exe 84 PID 4148 wrote to memory of 4036 4148 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\96dd42880a156fa404f4749a8687e3a3_JaffaCakes118.dll2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:4036
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5ead27117dfb20ee05c69db27171809e2
SHA1117e81870101e566058de1ee4e7b846ca1f4a7f3
SHA2560be754a7ea9ecb2e318ebcb0683ffcc284af4aeee59308c087296efee80c87a6
SHA5125728c7f64567f422d10bf68dbae431e2d4cdcdf6a245639d262ca2739b953c6f159c07bbd5a3b5f46cb8743caa384c7cd082ebcb6dd474369875d15e333f0b41