Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
bd8b0a77213c5cabe0784876f6c85c88_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd8b0a77213c5cabe0784876f6c85c88_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd8b0a77213c5cabe0784876f6c85c88_JaffaCakes118.dll
-
Size
63KB
-
MD5
bd8b0a77213c5cabe0784876f6c85c88
-
SHA1
bff4167cc2acc4b1550da0080c578c08a8a1647b
-
SHA256
f92167941587d783b751d149b98e91bb4c1e0b0c624292b2337137c1545bcfa5
-
SHA512
84679152a0850fb42d0be670cfc9eee84d650bdd55c70f1d760aaf508cb184a580c890e6406f7ed767ed5940ecc48e551f9ba526242c421970e0f9128f6c860a
-
SSDEEP
768:tdGvJuh51O/szqazvtBSzdG0Gv8xSNj49UIjCmca90uhcmn9xGuTlSB9It:tchqbzZt8nsK0a9LhNhz
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Services\Parameters\ServiceDll = "C:\\Windows\\system32\\520hk.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1536 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\520hk.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\520hk.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2400 2052 rundll32.exe 84 PID 2052 wrote to memory of 2400 2052 rundll32.exe 84 PID 2052 wrote to memory of 2400 2052 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8b0a77213c5cabe0784876f6c85c88_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd8b0a77213c5cabe0784876f6c85c88_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5bd8b0a77213c5cabe0784876f6c85c88
SHA1bff4167cc2acc4b1550da0080c578c08a8a1647b
SHA256f92167941587d783b751d149b98e91bb4c1e0b0c624292b2337137c1545bcfa5
SHA51284679152a0850fb42d0be670cfc9eee84d650bdd55c70f1d760aaf508cb184a580c890e6406f7ed767ed5940ecc48e551f9ba526242c421970e0f9128f6c860a