Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
003a64680130852de73c74da132629f6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
003a64680130852de73c74da132629f6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
003a64680130852de73c74da132629f6_JaffaCakes118.dll
-
Size
100KB
-
MD5
003a64680130852de73c74da132629f6
-
SHA1
b68feee91d53570ac5eb526e08e264b4891e69fb
-
SHA256
c4850f34d227de2b60958f6317fb6d0d5ea1114670ca0f310d4bda6c25fa3bb0
-
SHA512
20c9d5a8cf6a4ac719b21eefaea427357b7fb3398859a73e12c8218ef7e2f4f64d333919885666e7257ecd0fd6549999e357927b77e0ce0bdc1f675c67d44a6c
-
SSDEEP
1536:ITbO//QDkgsqj8T4RkDiKOa9RXEFHYRpGnCUrl5:IvsGpB8UShrEFHwQ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\DefaultVideo = "{3e9aad4c-3228-4e42-aa58-8abc8f215a27}" regsvr32.exe -
Loads dropped DLL 2 IoCs
pid Process 4920 regsvr32.exe 4920 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Default\DefaultVideo.dll regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3e9aad4c-3228-4e42-aa58-8abc8f215a27} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3e9aad4c-3228-4e42-aa58-8abc8f215a27}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3e9aad4c-3228-4e42-aa58-8abc8f215a27}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Default\\DefaultVideo.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3e9aad4c-3228-4e42-aa58-8abc8f215a27}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4920 regsvr32.exe 4920 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4920 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4920 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4920 1856 regsvr32.exe 82 PID 1856 wrote to memory of 4920 1856 regsvr32.exe 82 PID 1856 wrote to memory of 4920 1856 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\003a64680130852de73c74da132629f6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\003a64680130852de73c74da132629f6_JaffaCakes118.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5003a64680130852de73c74da132629f6
SHA1b68feee91d53570ac5eb526e08e264b4891e69fb
SHA256c4850f34d227de2b60958f6317fb6d0d5ea1114670ca0f310d4bda6c25fa3bb0
SHA51220c9d5a8cf6a4ac719b21eefaea427357b7fb3398859a73e12c8218ef7e2f4f64d333919885666e7257ecd0fd6549999e357927b77e0ce0bdc1f675c67d44a6c