Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
03df5f9813d3c7d25e907b9013398226_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
03df5f9813d3c7d25e907b9013398226_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Errors
General
-
Target
03df5f9813d3c7d25e907b9013398226_JaffaCakes118.dll
-
Size
147KB
-
MD5
03df5f9813d3c7d25e907b9013398226
-
SHA1
7c4a46e0dcd2b3ab490bf332a2310790abab58ee
-
SHA256
07ba94c335f0c08143c1799eea9ea14371cdeed91181e8a733a704c22d3bd45b
-
SHA512
4803a3fa54a9e92f6180bed07f507241b10a15376145dcf8c00238c34e6a25e9ae82da7ee287e4cce903a856a1bafd0e20d67bf941980fb6062d906f444356a0
-
SSDEEP
3072:w0KoPm3fslD98wpKV7Iv5X3DqqBZ9zVWsqA4EKzWKRefU4LrTmL:Z+PslD98w8tIOUgWBUOi
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 13 3960 rundll32.exe 35 3960 rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winmgmt\Parameters\ServiceDll = "C:\\PROGRA~3\\odq0jj6e.pzz" regedit.exe -
Loads dropped DLL 1 IoCs
pid Process 3960 rundll32.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\PROGRA~3\e6jj0qdo.plz rundll32.exe File created C:\PROGRA~3\odq0jj6e.pff rundll32.exe File opened for modification C:\PROGRA~3\odq0jj6e.pff rundll32.exe File created C:\PROGRA~3\odq0jj6e.ctrl rundll32.exe File created C:\PROGRA~3\odq0jj6e.reg rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "66" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4680 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe 3960 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3960 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4648 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2704 3232 rundll32.exe 89 PID 3232 wrote to memory of 2704 3232 rundll32.exe 89 PID 3232 wrote to memory of 2704 3232 rundll32.exe 89 PID 2704 wrote to memory of 3960 2704 rundll32.exe 90 PID 2704 wrote to memory of 3960 2704 rundll32.exe 90 PID 2704 wrote to memory of 3960 2704 rundll32.exe 90 PID 3960 wrote to memory of 4680 3960 rundll32.exe 101 PID 3960 wrote to memory of 4680 3960 rundll32.exe 101 PID 3960 wrote to memory of 4680 3960 rundll32.exe 101
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03df5f9813d3c7d25e907b9013398226_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03df5f9813d3c7d25e907b9013398226_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\PROGRA~3\e6jj0qdo.plz,GL3003⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe -s C:\PROGRA~3\odq0jj6e.reg4⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4680
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:3836
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3966055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD503df5f9813d3c7d25e907b9013398226
SHA17c4a46e0dcd2b3ab490bf332a2310790abab58ee
SHA25607ba94c335f0c08143c1799eea9ea14371cdeed91181e8a733a704c22d3bd45b
SHA5124803a3fa54a9e92f6180bed07f507241b10a15376145dcf8c00238c34e6a25e9ae82da7ee287e4cce903a856a1bafd0e20d67bf941980fb6062d906f444356a0
-
Filesize
285B
MD5cd937f519bc4ddcab5838c1b2422575a
SHA1940aac4b1776aa9d84c420a813891a571d00d46e
SHA256d2cd06f9f6f623d2665c604c09d6d30713572430df7cab6e1152aa547f9e0368
SHA512dbb992fb73347bdd8f83aa4eca8174d79cb565cf0ffd66c7071c2c6d447573430320bbf8570cbd85450f50b3f7f1bec4916571df516246a41cc20e24518d6310