Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
daf2e09d7ebd85fa3af2bda706373f0e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daf2e09d7ebd85fa3af2bda706373f0e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
daf2e09d7ebd85fa3af2bda706373f0e_JaffaCakes118.dll
-
Size
177KB
-
MD5
daf2e09d7ebd85fa3af2bda706373f0e
-
SHA1
1fac1a0eb982e00ee0937ed30d668f7d90a6be11
-
SHA256
6f822f3ba4b89c9354812994275daf7f5c703b4280f4cd313cbd3bc550185ce9
-
SHA512
67031025a92b776b3b34f5191f1c125a85d8ca14054f20135d277cbc49e71db34caf185cd810f2d72b5f14358e9f3a4a2eea06716b73ae4a664b778b79f75905
-
SSDEEP
3072:iaN+29hqJJm4IUGgn3/6o9FkIg+2Rni7hFNnUiQV5Xqg:iG+22JJm4Ic3yK2npENUiQPq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2360 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\smart\10027.dll rundll32.exe File created C:\Program Files (x86)\smart\10027.dll rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WindowS\RD_SmartUpdate.log rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1272 rundll32.exe Token: SeRestorePrivilege 1272 rundll32.exe Token: SeBackupPrivilege 1272 rundll32.exe Token: SeRestorePrivilege 1272 rundll32.exe Token: SeBackupPrivilege 1272 rundll32.exe Token: SeRestorePrivilege 1272 rundll32.exe Token: SeBackupPrivilege 1272 rundll32.exe Token: SeRestorePrivilege 1272 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30 PID 2060 wrote to memory of 1272 2060 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daf2e09d7ebd85fa3af2bda706373f0e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daf2e09d7ebd85fa3af2bda706373f0e_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD567824455156ebda730143ac78bd90e78
SHA1d4512fd8b17b2cff883f55513fc5e4aba44e3fa3
SHA256fc59554f1b334e95fc6e42532103f8758c4560df818eb7e9988dfa18bf121f3f
SHA5126d630537619db8270d974c3364a4b5c4f64960e4c53563dd525b245f89bb58ac551a331dca79494d2ae116e99e37f2fa2f9717ccc8f9d8dea0c5460449c6f1bf