Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
f0ba7ce74b762d6e3027e5b5f433a29c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0ba7ce74b762d6e3027e5b5f433a29c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f0ba7ce74b762d6e3027e5b5f433a29c_JaffaCakes118.dll
-
Size
252KB
-
MD5
f0ba7ce74b762d6e3027e5b5f433a29c
-
SHA1
58d64c03a11d66a0a7bb4b3b629551dd0a772af2
-
SHA256
275ff1a58cc55f0aeae3d35c88bfb575c5a8549416b41a3395bf6e1978dc1b30
-
SHA512
a8f16e408f0580763f5efb99eb8239441c03dafca1a2e5305cfb5c62ea9f925013945006873ce6167291a247006dfb53b5d4cd24569c93178925b31deed1c226
-
SSDEEP
6144:jjq18KK/bJ4TGPlsI7T3FV1DhlkjVK5OBI1AV2jnrgnU8YrmWTvj0Cz3d73/SnPT:q18JpNsI7T3FV1DhlkjVK5OBI1AV2jnd
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xkefqtgs = "{6475AAA4-B95D-44CB-9D44-2D345876FDEB}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6475AAA4-B95D-44CB-9D44-2D345876FDEB} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6475AAA4-B95D-44CB-9D44-2D345876FDEB}\InProcServer32\ = "C:\\Windows\\xkefqtgs.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6475AAA4-B95D-44CB-9D44-2D345876FDEB}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30 PID 2960 wrote to memory of 2260 2960 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0ba7ce74b762d6e3027e5b5f433a29c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f0ba7ce74b762d6e3027e5b5f433a29c_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2260
-