Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
-
Size
31KB
-
MD5
003ed780d8e7397393c6801bb24ab192
-
SHA1
7426bd67475742990f4daf0516f2099a24a0a9ba
-
SHA256
9ebf818e9b14fdddbe97353cae0f61345515d24b11fa7f2c72690902d075e625
-
SHA512
926574f9ace1bffe120e195bb19e575bd8c0af99e3ac4a6b5fe255ab69da99483ca2608075ca5e5a24dca2c2f4064035409b1e9d5fd447b6d33bfac995060b68
-
SSDEEP
768:MXRy+iuiVFQphpfAr9mU/thRWtXy09B4ZLlL:MhuzFQpn4rbVEi+sRL
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lua.wkl rundll32.exe File opened for modification C:\Windows\SysWOW64\lua.wkl rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\plugs.dll rundll32.exe File opened for modification C:\Windows\plugs.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2720 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,1289967921,-2036409223,-352895392" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2880 wrote to memory of 2904 2880 rundll32.exe 30 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31 PID 2904 wrote to memory of 2720 2904 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\plugs.dll",_RunAs@163⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5003ed780d8e7397393c6801bb24ab192
SHA17426bd67475742990f4daf0516f2099a24a0a9ba
SHA2569ebf818e9b14fdddbe97353cae0f61345515d24b11fa7f2c72690902d075e625
SHA512926574f9ace1bffe120e195bb19e575bd8c0af99e3ac4a6b5fe255ab69da99483ca2608075ca5e5a24dca2c2f4064035409b1e9d5fd447b6d33bfac995060b68