Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
da086dce6bb184e533f899f51a9430fb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da086dce6bb184e533f899f51a9430fb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
da086dce6bb184e533f899f51a9430fb_JaffaCakes118.dll
-
Size
307KB
-
MD5
da086dce6bb184e533f899f51a9430fb
-
SHA1
72293cb49564cb86cf9330ddc210f587c8722396
-
SHA256
b1eb4cd6640d8356807e974a2c857e09846e45574d5b640e91b2a5f0d7cf4e7b
-
SHA512
de567bdbf94e8a3f443913dae766321c68bfa41fc4278e22869c26afa9b1b2a97cf54c8db53b723361efce1d8d08a74d7b3a5f4ef2f1471494f09a0d914aa9c6
-
SSDEEP
6144:6I/UK/07u5Ie2y2SjorP8QOmeH6Ar8CPaHZNfICHrhHJpR4Yxy:lVOe2ybk4Nraa80a7ICHDTy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00640061003000380036006400630065003600620062003100380034006500350033003300660038003900390066003500310061003900340033003000660062005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4976 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 4976 3416 rundll32.exe 83 PID 3416 wrote to memory of 4976 3416 rundll32.exe 83 PID 3416 wrote to memory of 4976 3416 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da086dce6bb184e533f899f51a9430fb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da086dce6bb184e533f899f51a9430fb_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4976
-