Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
b770b04faaa016fe5687b143a9b4ca44_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b770b04faaa016fe5687b143a9b4ca44_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b770b04faaa016fe5687b143a9b4ca44_JaffaCakes118.dll
-
Size
196KB
-
MD5
b770b04faaa016fe5687b143a9b4ca44
-
SHA1
2b661a9846ac8dd608a7be9e52447b08e6dfaacc
-
SHA256
8a2b67b5a565e56c96995eee6f03c15214fc103311ca38c94c52b917ab1b3f8d
-
SHA512
2020a18db389bcd81489709db154791ae51d72c1fe7d1a86017b6fcbf57cfe88fdfb92d841d4c39c2bcde01e32b82a76935909d98311068c34bb978188d7ae7c
-
SSDEEP
3072:iKRAHIkjJRqKoeqEtVEWm7Vzy5V6s1MtFBeU4RDatLBcI:gHIkjJRqKKE0V8nU4RE
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\alofkmn = "{169CC175-1A39-4A38-9918-CD479D2755D2}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{169CC175-1A39-4A38-9918-CD479D2755D2}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{169CC175-1A39-4A38-9918-CD479D2755D2} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{169CC175-1A39-4A38-9918-CD479D2755D2}\InProcServer32\ = "C:\\Windows\\alofkmn.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30 PID 2544 wrote to memory of 2400 2544 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b770b04faaa016fe5687b143a9b4ca44_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b770b04faaa016fe5687b143a9b4ca44_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2400
-