Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll
-
Size
52KB
-
MD5
05d7d49c9858e1d1c1970d82b9907eda
-
SHA1
3bf435db1f6a18439d875ae83a0b3f62d36cf644
-
SHA256
f39adc7a86beff3966a84104d7b9d1e2481f88350f866d0ff5a5c6dd651376ac
-
SHA512
f73b80bba7a06e80c3b4b69480b0b011bf7d855790aa407e33201b405af8de50f7d6f4be9c7ef14101a49d54b8ffbc61cece6d363098887bb7b7796a43c45bc4
-
SSDEEP
1536:7Oatzw9ewxyM6z5cimC85L0YiPUykwSatAFe:ZtMN617+L7wSatke
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\mvscrtz.dll rundll32.exe File opened for modification C:\Windows\system\mvscrtz.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{55CEE3FA-6DFB-4bc4-B63D-9EA3B63B8527} = "05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll,1269223723,-1113147180,1942074416" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 1620 wrote to memory of 2300 1620 rundll32.exe 30 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31 PID 2300 wrote to memory of 3052 2300 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05d7d49c9858e1d1c1970d82b9907eda_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32 shell32,Control_RunDLL "C:\Windows\system\mvscrtz.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD505d7d49c9858e1d1c1970d82b9907eda
SHA13bf435db1f6a18439d875ae83a0b3f62d36cf644
SHA256f39adc7a86beff3966a84104d7b9d1e2481f88350f866d0ff5a5c6dd651376ac
SHA512f73b80bba7a06e80c3b4b69480b0b011bf7d855790aa407e33201b405af8de50f7d6f4be9c7ef14101a49d54b8ffbc61cece6d363098887bb7b7796a43c45bc4