Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
ff14b8bb81d4b1b2d31ceb1643e71ad7_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff14b8bb81d4b1b2d31ceb1643e71ad7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff14b8bb81d4b1b2d31ceb1643e71ad7_JaffaCakes118.dll
-
Size
176KB
-
MD5
ff14b8bb81d4b1b2d31ceb1643e71ad7
-
SHA1
d85611d3fc1fb3617b9d9525e587a9a83a7b4fa5
-
SHA256
2a2c9d85ae862f26b8f5e1f0c2dd8edffec88c3553c503e03017ae64ebc6d7fe
-
SHA512
f70952ee5bf134cafb9b53ef4aa3e28cec5b045562065ae8bb14930f41b84c5db92030e82a118bf46166c5dcdb70a5eef2ba99b7b83c0ee003239df0e6562ec5
-
SSDEEP
3072:FkGM3Xk47seowq4c95vDq8zOXGlCTXr+/OJDuZLegVtPq/:unXJseE4cG8Vlkz8fXU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\axrfgvek = "{232889E8-CBD6-45ED-B78A-BB5FE024F6D2}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{232889E8-CBD6-45ED-B78A-BB5FE024F6D2}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{232889E8-CBD6-45ED-B78A-BB5FE024F6D2} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{232889E8-CBD6-45ED-B78A-BB5FE024F6D2}\InProcServer32\ = "C:\\Windows\\axrfgvek.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4920 2352 rundll32.exe 82 PID 2352 wrote to memory of 4920 2352 rundll32.exe 82 PID 2352 wrote to memory of 4920 2352 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff14b8bb81d4b1b2d31ceb1643e71ad7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff14b8bb81d4b1b2d31ceb1643e71ad7_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4920
-