Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d24a820f84e669e46d641bc9a8be494c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d24a820f84e669e46d641bc9a8be494c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d24a820f84e669e46d641bc9a8be494c_JaffaCakes118.dll
-
Size
33KB
-
MD5
d24a820f84e669e46d641bc9a8be494c
-
SHA1
8a872cd1d2e9486524a584c55d72891a2e8b76f8
-
SHA256
c2c871910bbfac7bb4539d692ddcfd257c0124a6cb8125a2a1109d678c3d4ab7
-
SHA512
e23144b6b2ac2e18897fee66e4a8573c7a1995674efc58ed2dc6be91b25c06f52e08422ec1f988f44ec2c4c20e09395a7f030090d54ab850594fd29a4ac6fb2f
-
SSDEEP
768:4wRslJKTFf688AxeiRo95y47HwRxeSmmzxmF:dRssf68dxetq472Mazx8
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2688 rundll32.exe 2688 rundll32.exe 4692 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\yayyYOhG.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\yayyYOhG.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\yayyYOhG.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32\ = "C:\\Windows\\SysWow64\\yayyYOhG.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B}\InprocServer32\ThreadingModel = "Both" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EC66E48-B863-4413-BC91-463D9CCA093B} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2688 rundll32.exe 2688 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2688 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2688 4964 rundll32.exe 83 PID 4964 wrote to memory of 2688 4964 rundll32.exe 83 PID 4964 wrote to memory of 2688 4964 rundll32.exe 83 PID 2688 wrote to memory of 616 2688 rundll32.exe 5 PID 2688 wrote to memory of 4692 2688 rundll32.exe 96 PID 2688 wrote to memory of 4692 2688 rundll32.exe 96 PID 2688 wrote to memory of 4692 2688 rundll32.exe 96
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d24a820f84e669e46d641bc9a8be494c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d24a820f84e669e46d641bc9a8be494c_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\yayyYOhG.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5d24a820f84e669e46d641bc9a8be494c
SHA18a872cd1d2e9486524a584c55d72891a2e8b76f8
SHA256c2c871910bbfac7bb4539d692ddcfd257c0124a6cb8125a2a1109d678c3d4ab7
SHA512e23144b6b2ac2e18897fee66e4a8573c7a1995674efc58ed2dc6be91b25c06f52e08422ec1f988f44ec2c4c20e09395a7f030090d54ab850594fd29a4ac6fb2f