Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
d05e8cbd7d0943e1df996fb1c00f6bf0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d05e8cbd7d0943e1df996fb1c00f6bf0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d05e8cbd7d0943e1df996fb1c00f6bf0_JaffaCakes118.dll
-
Size
314KB
-
MD5
d05e8cbd7d0943e1df996fb1c00f6bf0
-
SHA1
3ce7e143fd87426f8d058c645007108f472d67b7
-
SHA256
21a272e299823d67dc470e425fc66cba0b61890d6326f5d2fd9ab496f6c5c54d
-
SHA512
93e6c30e3a503c5785cc6c6928b62f2f7cc63eb172ee6e0c5d04fd5175e175e9491a00e66fc5dd9c4896d2197ec286af5c6b17c79563620813af6553fd4d8283
-
SSDEEP
6144:AGGSnH+QhxKheiRZIGEmNlNH/a25jv0PVyxyEqRzYzjBU2fr7Xn3e:AGDHZqhl2mnFR5j/3YzWBUEn3e
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00640030003500650038006300620064003700640030003900340033006500310064006600390039003600660062003100630030003000660036006200660030005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2488 2904 rundll32.exe 86 PID 2904 wrote to memory of 2488 2904 rundll32.exe 86 PID 2904 wrote to memory of 2488 2904 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d05e8cbd7d0943e1df996fb1c00f6bf0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d05e8cbd7d0943e1df996fb1c00f6bf0_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2488
-