Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
de7500fc1065a081180841f32f06a537_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de7500fc1065a081180841f32f06a537_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
de7500fc1065a081180841f32f06a537_JaffaCakes118.dll
-
Size
136KB
-
MD5
de7500fc1065a081180841f32f06a537
-
SHA1
2004f191a052cee6b033acc518f1c64bb0b00ecd
-
SHA256
95e08990fdf11251e9ee935f0b2e075667133758bc68c4d390e82f041a54e4b3
-
SHA512
2a0d8e94998650cda91b64aeb4259fa6e4e00bd9d49769b37e5c98556c03addc1785654446c2759195cb7558f3553e155e9ee8d93a433211a308cbef3a9b34b9
-
SSDEEP
3072:Pk5WpezDE6SWpAWF+BqBZZHm5ZkXTNtW7d4efrOnrsyTD:CztSWKWcBqBPHmOMd4efWhD
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\ObjectName = "LocalSystem" regsvr32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters regsvr32.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters\Security = 59000f0005000f000800190011000e00130013000800590020000f0005000f000800190011004f004e0020000b0009001d000900190012001b0052001800100010007c00 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters\ServiceDll = "%Systemroot%\\System32\\Msresjrv.ttf" regsvr32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\{6AB5E732-DFA9-4618-AF1C-F0D9DEF0E222}.sys regsvr32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters\ServiceDll = "%Systemroot%\\System32\\Msresjrv.ttf" regsvr32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{6AB5E732-DFA9-4618-AF1C-F0D9DEF0E222}\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\{6AB5E732-DFA9-4618-AF1C-F0D9DEF0E222}.sys" regsvr32.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Msresjrv.ttf regsvr32.exe File created C:\Windows\SysWOW64\Msresjrv.ttf regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 3968 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1600 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1600 regsvr32.exe Token: SeLoadDriverPrivilege 1600 regsvr32.exe Token: SeShutdownPrivilege 1600 regsvr32.exe Token: SeTcbPrivilege 1600 regsvr32.exe Token: SeLoadDriverPrivilege 1600 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3968 2248 regsvr32.exe 90 PID 2248 wrote to memory of 3968 2248 regsvr32.exe 90 PID 2248 wrote to memory of 3968 2248 regsvr32.exe 90 PID 3968 wrote to memory of 1600 3968 regsvr32.exe 91 PID 3968 wrote to memory of 1600 3968 regsvr32.exe 91 PID 3968 wrote to memory of 1600 3968 regsvr32.exe 91
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\de7500fc1065a081180841f32f06a537_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\de7500fc1065a081180841f32f06a537_JaffaCakes118.dll2⤵
- Modifies security service
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u "C:\Windows\system32\Msresjrv.ttf"3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3924,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Server Software Component
1Terminal Services DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5de7500fc1065a081180841f32f06a537
SHA12004f191a052cee6b033acc518f1c64bb0b00ecd
SHA25695e08990fdf11251e9ee935f0b2e075667133758bc68c4d390e82f041a54e4b3
SHA5122a0d8e94998650cda91b64aeb4259fa6e4e00bd9d49769b37e5c98556c03addc1785654446c2759195cb7558f3553e155e9ee8d93a433211a308cbef3a9b34b9