Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
-
Size
444KB
-
MD5
eac13f616457570bb1e9521682d25927
-
SHA1
52fb62a6fd5e4fa055f8bf6c9bc059e3023b52bf
-
SHA256
83284a68d547a10aeb7a7f22fcd350dfe97c890edb38113aa21b191769820e52
-
SHA512
4e6e9c9d8a5135e0ceb8b0a808d9ed75bf2f7ff37b1435bb6bb2af024afc0e646f618f7a2ce678f4672410d5072aaed9ee73935378fe8fe59b57e940206556cf
-
SSDEEP
6144:1SwtUitSs5dqsRkbmmWNujJ/qqbCSxny06wMh6j6btD:15NSYdq2m8uJq7UmNk6hD
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\{EBB244A038913B922D0272D04E096E98}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\B54C.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2132 wrote to memory of 2560 2132 rundll32.exe 30 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31 PID 2560 wrote to memory of 2432 2560 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac13f616457570bb1e9521682d25927_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac13f616457570bb1e9521682d25927_JaffaCakes118.dll,#12⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\AD6F.tmp3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5b4f4de1f18007fecc91097808d71384c
SHA1423e4177607aceb0be165f272682bf2fce2f27b9
SHA256215b4e94d289a3c4cbf21e578fe301d5e068850044a6ec4e55b7a001b70db267
SHA512330fef0a22f23720f1112702f777304633def1fbfd94cf8193a9eda2059f900c73d697da6dce4d4d1694998a7319614e6851a036a1805fc859955853e1c9f074