Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
e4a088773d56d0f6e7d1582f100b5137_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e4a088773d56d0f6e7d1582f100b5137_JaffaCakes118.dll
-
Size
485KB
-
MD5
e4a088773d56d0f6e7d1582f100b5137
-
SHA1
5cf878a09b2de0b664467b928ad03453e5c1491e
-
SHA256
45f3f5d22895889574eb220c91242129153c6d85374d08665348c3bbe3414543
-
SHA512
eea5d926f100f5ae136e2ea5c71530ff087349ed89aa069b1cc4490ca8bb0432e1013e953de6c56befd660acd673d388aeef3e9db0ced7cbd4dd71ed432f0f6d
-
SSDEEP
6144:2GZEvCrxV4BFoLncn4XAVTDLg3z7uM5ecKsNuDQB0UHziTC8LFHPdqBp:veKrxuTsc/jazf5RKpEHT4Bdcp
Malware Config
Extracted
zloader
r1
r1
http://bsraotpeiimmrnchcqvr.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://exqnbgauiphxqdeecitw.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://fpbkvirfkfvufpbkvgty.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://hikowojacckxccgglhvy.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://kdrowkrjhrdmbxkthljt.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://nvlmtlisfmcfgimicstx.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://syohvyctqfcgakxepsou.com/LKhwojehDgwegSDG/gateJKjdsh.php
http://wdwrhikolxfwyyhwwfut.com/LKhwojehDgwegSDG/gateJKjdsh.php
-
build_id
17
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2672 created 1200 2672 regsvr32.exe 21 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 1500 2672 regsvr32.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2672 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 regsvr32.exe Token: SeSecurityPrivilege 1500 msiexec.exe Token: SeSecurityPrivilege 1500 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2240 wrote to memory of 2672 2240 regsvr32.exe 31 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33 PID 2672 wrote to memory of 1500 2672 regsvr32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e4a088773d56d0f6e7d1582f100b5137_JaffaCakes118.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e4a088773d56d0f6e7d1582f100b5137_JaffaCakes118.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1500
-