Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
0c7107cf2cf696615f1553883b6191a6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c7107cf2cf696615f1553883b6191a6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0c7107cf2cf696615f1553883b6191a6_JaffaCakes118.dll
-
Size
315KB
-
MD5
0c7107cf2cf696615f1553883b6191a6
-
SHA1
7194bd7f9b8da15965a337d5106f4cc8c58400b8
-
SHA256
cda6c24c4e2b8fd3cab982ee97b1b083122d5880fd5a20e015721aee404b8961
-
SHA512
1496bc091b4dbccb87e040877cc68269673625ad5c9960d87a10fcbcb863a7c11967609a158a40f6518171e637de8fc6e46fd150c8345c03f8ee98b4d146ed6f
-
SSDEEP
6144:SzplAaUgyLdT4Ls/MQuwM5li1Xx2KsPcdC3L52zRKXYhPTOVd9P:S3xU9dz0iMLwh2bkC3NiKIxw5
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00300063003700310030003700630066003200630066003600390036003600310035006600310035003500330038003800330062003600310039003100610036005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4808 3256 rundll32.exe 82 PID 3256 wrote to memory of 4808 3256 rundll32.exe 82 PID 3256 wrote to memory of 4808 3256 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c7107cf2cf696615f1553883b6191a6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c7107cf2cf696615f1553883b6191a6_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4808
-