Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
-
Size
72KB
-
MD5
1234470662aeda854724e00aa02f86ad
-
SHA1
c0d09aef7505d611b3a252459fa90e1b9f3c04c1
-
SHA256
f49d41ee968d4184740682085623be10a5c2bb04a778ec7f76a43875445f56d6
-
SHA512
8f95c8f770afe2392de100ae3c435511d6a27412574055e49cbc5503d420aa4c5b749474da8abaf4b189d28bf7b4cd71b2be47c2cbcb8d35f490de2a2ffeece2
-
SSDEEP
1536:IoySfvnfvG7oAvXzZWHvxyHUgXQFDwdNfq3cjkj7yijcwX1:IBE202tHUTxwPfq3Qg7vjcwl
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NtmlSvc\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll" rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BarreConfCMCIC\TAPbar.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionTime = 10d8115b2616db01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionTime = 70a6b24f2616db01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionTime = 10d926542616db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionTime = 908cb1592616db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionTime = 10d8115b2616db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575} svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionTime = 70a6b24f2616db01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\a2-17-28-4e-6d-b7 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionTime = 10d926542616db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionTime = d032ec562616db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-17-28-4e-6d-b7\WpadDecisionTime = d032ec562616db01 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC6766AF-442B-4531-8D68-AEEF5E3A9575}\WpadDecisionTime = 908cb1592616db01 svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 svchost.exe 2796 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2796 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30 PID 1316 wrote to memory of 2244 1316 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796