Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll
-
Size
306KB
-
MD5
d0035c8a358ef32aaa519f842b91aaff
-
SHA1
994c5647b7dc7bae4431801090acdc741ce9e680
-
SHA256
3832d4effa9f255177cf04a0b174fa9d795f7282a3f4d73024eee04e5ec6ef7e
-
SHA512
76803bfbc9ead2dd864581491563650266c63e7ba2dac8ded49e157b131bccf3a830bf67018673ebb0d9889b3d5325dbb734e7a664ddadb0459164135c204364
-
SSDEEP
6144:k5QpZGqoblOwc2LhMsh+zCZZ30Efy2uOSvL0eZtWPylwJDNJg:k5Qeqs0wc2Fh+zCP3KOUL0aWPvNJg
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00640030003000330035006300380061003300350038006500660033003200610061006100350031003900660038003400320062003900310061006100660066005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3236 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3236 2332 rundll32.exe 83 PID 2332 wrote to memory of 3236 2332 rundll32.exe 83 PID 2332 wrote to memory of 3236 2332 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0035c8a358ef32aaa519f842b91aaff_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3236
-