Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:33
Behavioral task
behavioral1
Sample
b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll
-
Size
165KB
-
MD5
b7d5004bef0f467729a028d1e3400443
-
SHA1
1f7d1af6bc7061ea3254350a8ac28c134de6c3aa
-
SHA256
5735573e1c4a678ea0ff3a966db4d7bdebe75d84b669fff4858bd03f2e647968
-
SHA512
d9c329982d230b5de063704f72b109edde3520694bd909e31c1ffe8ce43e3150b49aee9e922a3d600cb9dc52fec76f5eefd1805922e12937e6de5403530c131d
-
SSDEEP
3072:ia3sh3AZ7jermUUBD6Xi+N3BRr0mRIcqNcKQopoaft+lL15YANipuorwGHFh3hL/:WhQZWrmNz+Nxl0mGc2cBQ0lL15YAkuRu
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\DCOM Server 60787 = "{2C1CD3D7-86AC-4068-93BC-A02304B60787}" rundll32.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2292 rundll32.exe 3 2292 rundll32.exe 6 2292 rundll32.exe 7 2292 rundll32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rundll32.exe -
resource yara_rule behavioral1/memory/2292-2-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-3-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-4-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-5-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-6-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-11-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-16-0x0000000010000000-0x0000000010D2E000-memory.dmp upx behavioral1/memory/2292-17-0x0000000010000000-0x0000000010D2E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C1CD3D7-86AC-4068-93BC-A02304B60787}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C1CD3D7-86AC-4068-93BC-A02304B60787} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C1CD3D7-86AC-4068-93BC-A02304B60787}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2C1CD3D7-86AC-4068-93BC-A02304B60787}\InProcServer32\ThreadingModel = "Apartment" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30 PID 1924 wrote to memory of 2292 1924 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7d5004bef0f467729a028d1e3400443_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Blocklisted process makes network request
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2292
-