Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac13f616457570bb1e9521682d25927_JaffaCakes118.dll
-
Size
444KB
-
MD5
eac13f616457570bb1e9521682d25927
-
SHA1
52fb62a6fd5e4fa055f8bf6c9bc059e3023b52bf
-
SHA256
83284a68d547a10aeb7a7f22fcd350dfe97c890edb38113aa21b191769820e52
-
SHA512
4e6e9c9d8a5135e0ceb8b0a808d9ed75bf2f7ff37b1435bb6bb2af024afc0e646f618f7a2ce678f4672410d5072aaed9ee73935378fe8fe59b57e940206556cf
-
SSDEEP
6144:1SwtUitSs5dqsRkbmmWNujJ/qqbCSxny06wMh6j6btD:15NSYdq2m8uJq7UmNk6hD
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{EBB244A038913B922D0272D04E096E98}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\51D.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3564 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2924 3944 rundll32.exe 85 PID 3944 wrote to memory of 2924 3944 rundll32.exe 85 PID 3944 wrote to memory of 2924 3944 rundll32.exe 85 PID 2924 wrote to memory of 3564 2924 rundll32.exe 88 PID 2924 wrote to memory of 3564 2924 rundll32.exe 88 PID 2924 wrote to memory of 3564 2924 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac13f616457570bb1e9521682d25927_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac13f616457570bb1e9521682d25927_JaffaCakes118.dll,#12⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\FD4C.tmp3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5b4f4de1f18007fecc91097808d71384c
SHA1423e4177607aceb0be165f272682bf2fce2f27b9
SHA256215b4e94d289a3c4cbf21e578fe301d5e068850044a6ec4e55b7a001b70db267
SHA512330fef0a22f23720f1112702f777304633def1fbfd94cf8193a9eda2059f900c73d697da6dce4d4d1694998a7319614e6851a036a1805fc859955853e1c9f074