Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
c8f457db907964dc2ad5f302ad3985c4_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8f457db907964dc2ad5f302ad3985c4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c8f457db907964dc2ad5f302ad3985c4_JaffaCakes118.dll
-
Size
252KB
-
MD5
c8f457db907964dc2ad5f302ad3985c4
-
SHA1
44333b872be108b6ea3570068bb0c5b289d44ffa
-
SHA256
ee9c5c5489a0bd098f3af6e8b5dd43b3859f0c3990fd4610c483ef31e3f93094
-
SHA512
1898529a07631416f6266843c6633650fd0621fab9836ff5ddb51b35aaf94cb28eef102c08b5758922453126951442b04dd0dcfe969e67a13f3a2975c59efb39
-
SSDEEP
3072:a1KUMaGRfSDOQ7G2DWI7dJJCdWMEry4QtL23aJd4Nwb8XUeFRIT4IoOXvg3rmmt/:jRfwvpCduysiSNwmvgdhXtkv3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\axrfgvek = "{8EDAE056-F307-4562-8C8B-D9CEDAE1FC33}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8EDAE056-F307-4562-8C8B-D9CEDAE1FC33}\InProcServer32\ = "C:\\Windows\\axrfgvek.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8EDAE056-F307-4562-8C8B-D9CEDAE1FC33}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8EDAE056-F307-4562-8C8B-D9CEDAE1FC33} rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1260 1648 rundll32.exe 83 PID 1648 wrote to memory of 1260 1648 rundll32.exe 83 PID 1648 wrote to memory of 1260 1648 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f457db907964dc2ad5f302ad3985c4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f457db907964dc2ad5f302ad3985c4_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1260
-