Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
eed0ffd9b9cda03fec99477db1c86c5b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eed0ffd9b9cda03fec99477db1c86c5b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eed0ffd9b9cda03fec99477db1c86c5b_JaffaCakes118.dll
-
Size
4.9MB
-
MD5
eed0ffd9b9cda03fec99477db1c86c5b
-
SHA1
64b411590a05a21cd24caf2205c6a9f80051948f
-
SHA256
073c2866f9495a3ae8edb03e25acac783faf86e5953679fef3cf46708a0e139d
-
SHA512
7352ea4c9c3ada7e24fb0df8d893fba038307864c0f49a74ad14dce56f5c08193d89109bd2aafd5393e088863148189bb024071ebe7d764c6376e72fa29b76f7
-
SSDEEP
6144:IS44io4Ukuqb0WFGtBFgN/1aAgrr8gFpojB:1Qo4UkuqAW04Qrr8gFq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WebCheck = "{E6FB5E20-DE35-11CF-9C87-00AA005127ED}" rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3380 rundll32.exe 3380 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\locraarfo.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\locraarfo.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2368 3380 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32\ = "C:\\Windows\\SysWow64\\locraarfo.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3380 4244 rundll32.exe 82 PID 4244 wrote to memory of 3380 4244 rundll32.exe 82 PID 4244 wrote to memory of 3380 4244 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eed0ffd9b9cda03fec99477db1c86c5b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eed0ffd9b9cda03fec99477db1c86c5b_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 9323⤵
- Program crash
PID:2368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3380 -ip 33801⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD54e74e994b5cb6685f4aaa5a2e252681e
SHA170a7a582eb10282fab5c295ddd948d080591d056
SHA256a770fdc6d0931404235cab82b80ee6158d122ac124f902ae986a1d3eae60c172
SHA512fa17ccb66f0971d770aff4ba15b212886b4decca2485b606a446b4c1f301be7f66331bcd756bcef4d9c6ff18a06bd592771dfe03bde934553333e7ca6c9cea27