Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll
-
Size
29KB
-
MD5
ce5b76672e79c99796cd86809394a866
-
SHA1
e7750f022b8b360814bb58c781f08b3280c9e29d
-
SHA256
3d40fee430c3695ac4c07d6fe1f96865ef091759c92bd3495fecdbfef68b4cfb
-
SHA512
1740bf546ec1acc15407958271dccf7bf3a3b83167c40f35881f953672ad7fbfd75e1bb925fbde475bea43385bc4b441d0fe29824132fd852ffa3e33e4444e48
-
SSDEEP
768:Qnn3mSfFMRCQfGan8oFLcJSjM2w6rAJx4Wt6rL:63tSwQnFLLA2RMJ1t6rL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2912 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cdp3.dll rundll32.exe File opened for modification C:\Windows\cdp3.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2912 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll,1303464799,464025197,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1920 1108 rundll32.exe 83 PID 1108 wrote to memory of 1920 1108 rundll32.exe 83 PID 1108 wrote to memory of 1920 1108 rundll32.exe 83 PID 1920 wrote to memory of 2912 1920 rundll32.exe 87 PID 1920 wrote to memory of 2912 1920 rundll32.exe 87 PID 1920 wrote to memory of 2912 1920 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce5b76672e79c99796cd86809394a866_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\cdp3.dll",_RunAs@163⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ce5b76672e79c99796cd86809394a866
SHA1e7750f022b8b360814bb58c781f08b3280c9e29d
SHA2563d40fee430c3695ac4c07d6fe1f96865ef091759c92bd3495fecdbfef68b4cfb
SHA5121740bf546ec1acc15407958271dccf7bf3a3b83167c40f35881f953672ad7fbfd75e1bb925fbde475bea43385bc4b441d0fe29824132fd852ffa3e33e4444e48