Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll
-
Size
31KB
-
MD5
003ed780d8e7397393c6801bb24ab192
-
SHA1
7426bd67475742990f4daf0516f2099a24a0a9ba
-
SHA256
9ebf818e9b14fdddbe97353cae0f61345515d24b11fa7f2c72690902d075e625
-
SHA512
926574f9ace1bffe120e195bb19e575bd8c0af99e3ac4a6b5fe255ab69da99483ca2608075ca5e5a24dca2c2f4064035409b1e9d5fd447b6d33bfac995060b68
-
SSDEEP
768:MXRy+iuiVFQphpfAr9mU/thRWtXy09B4ZLlL:MhuzFQpn4rbVEi+sRL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 508 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lua.wkl rundll32.exe File opened for modification C:\Windows\SysWOW64\lua.wkl rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\plugs.dll rundll32.exe File opened for modification C:\Windows\plugs.dll rundll32.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 508 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,1289967921,-2036409223,-352895392" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe 508 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3864 1644 rundll32.exe 82 PID 1644 wrote to memory of 3864 1644 rundll32.exe 82 PID 1644 wrote to memory of 3864 1644 rundll32.exe 82 PID 3864 wrote to memory of 508 3864 rundll32.exe 83 PID 3864 wrote to memory of 508 3864 rundll32.exe 83 PID 3864 wrote to memory of 508 3864 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\003ed780d8e7397393c6801bb24ab192_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\plugs.dll",_RunAs@163⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5003ed780d8e7397393c6801bb24ab192
SHA17426bd67475742990f4daf0516f2099a24a0a9ba
SHA2569ebf818e9b14fdddbe97353cae0f61345515d24b11fa7f2c72690902d075e625
SHA512926574f9ace1bffe120e195bb19e575bd8c0af99e3ac4a6b5fe255ab69da99483ca2608075ca5e5a24dca2c2f4064035409b1e9d5fd447b6d33bfac995060b68