Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 06:00

General

  • Target

    ced6014ea824b17be1bc3690bdc366fd_JaffaCakes118.dll

  • Size

    26KB

  • MD5

    ced6014ea824b17be1bc3690bdc366fd

  • SHA1

    cf3c8f76980eefa8c9ccff69604ca2b9b451dfa3

  • SHA256

    92ecfc970df2bbb96dc8ba71830cbbd88f8bc79a338a7879613e97b52f38774b

  • SHA512

    92b89db043cdbebb67e9eb36c2d411af2810a26b1ef46bb24e60c4dce70d6869f84bd7112b84ae3653c9e8ddeb4a8655f1837808d92132079e9fba8cc167fa98

  • SSDEEP

    384:w2aXe03Izp+isy+/1IhNi7p6i/cP0kIrQXT4E70UhsGKxosXtKH1MF6sV+yJRn:w2+/rySektmTD4E7RsGtsXtt4sVdJRn

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies WinLogon 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ced6014ea824b17be1bc3690bdc366fd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ced6014ea824b17be1bc3690bdc366fd_JaffaCakes118.dll,#1
      2⤵
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\system32\__c00D333A.dat",B
        3⤵
        • Loads dropped DLL
        • Modifies WinLogon
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 640
        3⤵
        • Program crash
        PID:2980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2636 -ip 2636
    1⤵
      PID:4876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\__c00D333A.dat

      Filesize

      26KB

      MD5

      ced6014ea824b17be1bc3690bdc366fd

      SHA1

      cf3c8f76980eefa8c9ccff69604ca2b9b451dfa3

      SHA256

      92ecfc970df2bbb96dc8ba71830cbbd88f8bc79a338a7879613e97b52f38774b

      SHA512

      92b89db043cdbebb67e9eb36c2d411af2810a26b1ef46bb24e60c4dce70d6869f84bd7112b84ae3653c9e8ddeb4a8655f1837808d92132079e9fba8cc167fa98

    • memory/2636-0-0x0000000002300000-0x0000000002400000-memory.dmp

      Filesize

      1024KB

    • memory/3260-4-0x00000000025D0000-0x00000000026D0000-memory.dmp

      Filesize

      1024KB

    • memory/3260-5-0x0000000010000000-0x000000001000B000-memory.dmp

      Filesize

      44KB