Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
ac831b608810802a554b79d7b76db868_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac831b608810802a554b79d7b76db868_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ac831b608810802a554b79d7b76db868_JaffaCakes118.dll
-
Size
174KB
-
MD5
ac831b608810802a554b79d7b76db868
-
SHA1
488042b6b6489247bac9ccdfbefb6f56605ef2f8
-
SHA256
35b29d5619a8a6236368df256d172a8ffa4b4484c8cb74667c36d1917cc51f71
-
SHA512
4e951d1935f128eca13ca30da3c21176c8ec7baa0f70b8f39b09e7c325bc8273d3095ce8872c5a04eb0550a5d6d164408984806c2dccfeaeb68bd99cfd58f53a
-
SSDEEP
3072:MZtFthhaiuwQpDG71TjP+ZbcuOeNtuLDdzoWeh9km+TxhVGSSXZam70ZYB1:wFth+wQs71xEtYdzoWK9km+TvVGBak
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",rundll32.exe C:\\Windows\\system32\\070418.dll start" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mywinsys.ini rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 rundll32.exe 2332 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2332 rundll32.exe Token: SeDebugPrivilege 2332 rundll32.exe Token: SeDebugPrivilege 2332 rundll32.exe Token: SeDebugPrivilege 2332 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30 PID 2912 wrote to memory of 2332 2912 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac831b608810802a554b79d7b76db868_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac831b608810802a554b79d7b76db868_JaffaCakes118.dll,#12⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD5fab1f912897143d573511e1602d263ea
SHA1f75f5c5b9604d51c8705b26798f3341ba005827e
SHA256a162cf8a97d899153eff9fd4c9ff8f23cc62b7a82f9bce5ff0d199949e41fbdc
SHA512c3b1c137bed3a8d566353009921d235f38e786043acdd938d1f848d0a0220f65c7cf4301ed49fabebdcb1de9505ef5d61b8496ebb9f83e6d553e1aa819c6e2c7