Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b8c6fd76b60415438cb5f52692357862_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8c6fd76b60415438cb5f52692357862_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b8c6fd76b60415438cb5f52692357862_JaffaCakes118.dll
-
Size
286KB
-
MD5
b8c6fd76b60415438cb5f52692357862
-
SHA1
5c32b77d0ac7d55d30494b93517aba201b05b3e2
-
SHA256
39df7a3166db10407a9fa2142aedb2fbb624b613858cafe5ef7a29c4f7b61d69
-
SHA512
a2d79f9b57d170b3b9e64bbf87f9c9e67c0ec55227778af4de86af448357ce396ad708cec94dee04ca3f4500c84a93c8afe148c72c5735bbe0e6fb8290d0252b
-
SSDEEP
6144:8SjzY2oDV8pfFrWyJMG+WvoavmYMhPHSjdf2yzhLGBUGlYI4P1vzKNP:85/DVaBXJMG+B+mYKPHGzhLtgYIAC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\urrqopaudio = "rundll32.exe \"c:\\users\\admin\\appdata\\local\\temp\\b8c6fd76b60415438cb5f52692357862_jaffacakes118.dll\",s" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\bywtqoaudio = "rundll32.exe \"c:\\users\\admin\\appdata\\local\\temp\\b8c6fd76b60415438cb5f52692357862_jaffacakes118.dll\",s" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe 1328 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1328 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 2348 wrote to memory of 1328 2348 rundll32.exe 30 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5 PID 1328 wrote to memory of 1104 1328 rundll32.exe 19 PID 1328 wrote to memory of 1164 1328 rundll32.exe 20 PID 1328 wrote to memory of 272 1328 rundll32.exe 25 PID 1328 wrote to memory of 1192 1328 rundll32.exe 21 PID 1328 wrote to memory of 432 1328 rundll32.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8c6fd76b60415438cb5f52692357862_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8c6fd76b60415438cb5f52692357862_JaffaCakes118.dll,#13⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:272