Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
bdaecdcfc62b19eea46816006cd100bd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdaecdcfc62b19eea46816006cd100bd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bdaecdcfc62b19eea46816006cd100bd_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
bdaecdcfc62b19eea46816006cd100bd
-
SHA1
f5a6c0a8a318790d8ca1ebf82f116252c9fde58e
-
SHA256
c7b599ec3d13deb1ef61f7f9cff9e450cb4319ee37e56353fcaa7ea1aaeefd36
-
SHA512
8985c7c45d590378acec36164fb3aa1c61e09971b21bb37ba0c52b5012fb37259e025e378047c360d9311623b029810fdce7a570087b67f06413227a206f72c3
-
SSDEEP
6144:VS4wBsjoKXJdrI/ed3IHpxWDWain/JeoCK5ppOdo9DDI:8DiFzUK8bWDmBjCUpsoV
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WebCheck = "{E6FB5E20-DE35-11CF-9C87-00AA005127ED}" rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3684 rundll32.exe 3684 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\loevdolo.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\loevdolo.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3616 3684 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32\ = "C:\\Windows\\SysWow64\\loevdolo.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3684 3708 rundll32.exe 86 PID 3708 wrote to memory of 3684 3708 rundll32.exe 86 PID 3708 wrote to memory of 3684 3708 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdaecdcfc62b19eea46816006cd100bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdaecdcfc62b19eea46816006cd100bd_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9163⤵
- Program crash
PID:3616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3684 -ip 36841⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD566a5994dd6a6a5b7163f6b93489a2a5c
SHA137f0b50588e926e90d83f3b5133dd55ff4d99b95
SHA25652c205f165f382b9ff3584094633b9f87707d1f0dcdb764f18d3c80fdeb05cf4
SHA512c0f6559bffeb9924978314810a7020585c97df3c3143bc1eef4015df5fbb898ff2cc9f056747706aa9c06e19917453dfeed29b4beae3f77b1cb7082c896ad553