Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
edd125292f3e5fc9f1dd8cdecaca07ac_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edd125292f3e5fc9f1dd8cdecaca07ac_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
edd125292f3e5fc9f1dd8cdecaca07ac_JaffaCakes118.dll
-
Size
292KB
-
MD5
edd125292f3e5fc9f1dd8cdecaca07ac
-
SHA1
d48de05e9727949c5fa3f17cbd566c64244b2c4e
-
SHA256
521c33c31c73d1984428b5c0352eb63f1e77718bdc106197b832c6af0d2407ca
-
SHA512
932ae9efc83a10185b296e8a563bc3de4f13500a3aa526738b66d573d544d193340986b050e95cd293c654c57a535d2ab4aafa4b131de852426e2ee3f07ec2d8
-
SSDEEP
3072:io2UBnIeKFVWK8+Ih9eMMDYQ7GUylxC4lqwL/LS4punUonGJjsQRiYt362vxZc8D:DIeuVE+Ih9knIN/RNYee649dQJ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\aswmklt = "{BBC3BAFF-D1D7-4369-A858-53CF389D43C0}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBC3BAFF-D1D7-4369-A858-53CF389D43C0}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBC3BAFF-D1D7-4369-A858-53CF389D43C0} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBC3BAFF-D1D7-4369-A858-53CF389D43C0}\InProcServer32\ = "C:\\Windows\\aswmklt.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1964 1440 rundll32.exe 82 PID 1440 wrote to memory of 1964 1440 rundll32.exe 82 PID 1440 wrote to memory of 1964 1440 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edd125292f3e5fc9f1dd8cdecaca07ac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edd125292f3e5fc9f1dd8cdecaca07ac_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1964
-