Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
d43855837744c76d49098c87872f2def_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43855837744c76d49098c87872f2def_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d43855837744c76d49098c87872f2def_JaffaCakes118.dll
-
Size
678KB
-
MD5
d43855837744c76d49098c87872f2def
-
SHA1
2d91f544c595d69ff9a5acb1b243e9b79021c0f5
-
SHA256
a8a442945f784840607bd3335473ad018624efe6bf26c9cbfdece41740aff1a0
-
SHA512
b2c9fc75ba5325fb4a9516bb823fcc7924b019b5bb1d727c2c0f7360d2a778e24a69b14dcb33d920fec0be582c859aeb3b92ea36b37ef0c6d84de17ba1b198e5
-
SSDEEP
12288:Kj7TMzyp6deQj7xZ/qBm2Ahsy0JsPXCAcHfi3T:I7XpSeOZ/qrAhPCoy1fWT
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\z98rk1x5.sys rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{03364B3D0F6562646512274E88CEFE38}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\E918.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2112 wrote to memory of 2420 2112 rundll32.exe 30 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31 PID 2420 wrote to memory of 3068 2420 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d43855837744c76d49098c87872f2def_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d43855837744c76d49098c87872f2def_JaffaCakes118.dll,#12⤵
- Drops file in Drivers directory
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\C977.tmp3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5ca26064361e334e10da0bba35ced6e18
SHA1cfb6431f0319197202ff07540725c4c9321c74ec
SHA256798172597f848bda9fb8abf70472457a53292269786a0a6203a721a591dab437
SHA5120ade1b815e5ec0a58be5d458e4bbd4469fce8381a8af74b1255b074444c27c72236d71c4baae8e107fc4fb482353544285ce2a9f58dc3dbb662efe6bff7d6d7d