Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
a942373b18545ac3bcf86e774d38a6b5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a942373b18545ac3bcf86e774d38a6b5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a942373b18545ac3bcf86e774d38a6b5_JaffaCakes118.dll
-
Size
137KB
-
MD5
a942373b18545ac3bcf86e774d38a6b5
-
SHA1
6bd5d473b8b5f62a5f51cc2fe123be0f6a4497e3
-
SHA256
84948705fee010eaefb23ccd65be44459c8fe843409b12b50fcc297f790d8896
-
SHA512
bb9e01103fbcf3f31c40f29670ba22c4fd73708daeb0acee89203addb017ac8600eb0f78a419d9724e8bac0b15999850ea8abdd4a119a3b13d6e13f92d31a9e1
-
SSDEEP
3072:ITodYQXEDhWnp2g2hmPhZXc4Je/mZctxu/8ZyYEH:IEdOlWnpM4PhZXERxE8Zy
Malware Config
Signatures
-
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\BITS rundll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\BITS rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Sys.dll rundll32.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\259460504.dat rundll32.exe File created C:\Windows\259460550.dat rundll32.exe File created C:\Windows\259460582.dat rundll32.exe File created C:\Windows\259460644.dat rundll32.exe File created C:\Windows\259460660.dat rundll32.exe File created C:\Windows\259460691.dat rundll32.exe File created C:\Windows\259460410.dat rundll32.exe File created C:\Windows\259460457.dat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe Token: SeRestorePrivilege 1756 rundll32.exe Token: SeBackupPrivilege 1756 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a942373b18545ac3bcf86e774d38a6b5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a942373b18545ac3bcf86e774d38a6b5_JaffaCakes118.dll,#12⤵
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k 2594605351⤵PID:1352