Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
ee32b7676fcf484d6c3d817a0a533227_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee32b7676fcf484d6c3d817a0a533227_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ee32b7676fcf484d6c3d817a0a533227_JaffaCakes118.dll
-
Size
124KB
-
MD5
ee32b7676fcf484d6c3d817a0a533227
-
SHA1
aaa3bd3a20071809383e0f0df588219761cc0190
-
SHA256
853061126fa579a72a3c5143aee134c3ea624b6e740797fe256f6a0bc26f0fae
-
SHA512
e1e5bfb0431e24185ede64751ed712e6d1fbb189e8213e7299ef1c634872f3c2e1f3869b663cf7dfbd9958469f3e46e560dafbc540b056d701567a83a80eaac9
-
SSDEEP
3072:yfpIaHG+JehEj637/7pbIJmFIz2qwqFmsaIUdcw:zaHG2s4637NbIU2Nee
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Rational = "{45baac20-98b3-4cd5-b433-bae8519d95a5}" regsvr32.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Rational\Rational.dll regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{45baac20-98b3-4cd5-b433-bae8519d95a5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{45baac20-98b3-4cd5-b433-bae8519d95a5}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Rational\\Rational.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{45baac20-98b3-4cd5-b433-bae8519d95a5}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{45baac20-98b3-4cd5-b433-bae8519d95a5} regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2760 regsvr32.exe 2760 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2760 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31 PID 3052 wrote to memory of 2760 3052 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ee32b7676fcf484d6c3d817a0a533227_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ee32b7676fcf484d6c3d817a0a533227_JaffaCakes118.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5ee32b7676fcf484d6c3d817a0a533227
SHA1aaa3bd3a20071809383e0f0df588219761cc0190
SHA256853061126fa579a72a3c5143aee134c3ea624b6e740797fe256f6a0bc26f0fae
SHA512e1e5bfb0431e24185ede64751ed712e6d1fbb189e8213e7299ef1c634872f3c2e1f3869b663cf7dfbd9958469f3e46e560dafbc540b056d701567a83a80eaac9