Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll
-
Size
72KB
-
MD5
1234470662aeda854724e00aa02f86ad
-
SHA1
c0d09aef7505d611b3a252459fa90e1b9f3c04c1
-
SHA256
f49d41ee968d4184740682085623be10a5c2bb04a778ec7f76a43875445f56d6
-
SHA512
8f95c8f770afe2392de100ae3c435511d6a27412574055e49cbc5503d420aa4c5b749474da8abaf4b189d28bf7b4cd71b2be47c2cbcb8d35f490de2a2ffeece2
-
SSDEEP
1536:IoySfvnfvG7oAvXzZWHvxyHUgXQFDwdNfq3cjkj7yijcwX1:IBE202tHUTxwPfq3Qg7vjcwl
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NtmlSvc\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll" rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BarreConfCMCIC\TAPbar.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4888 svchost.exe 4888 svchost.exe 4888 svchost.exe 4888 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4888 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 944 wrote to memory of 2876 944 rundll32.exe 81 PID 944 wrote to memory of 2876 944 rundll32.exe 81 PID 944 wrote to memory of 2876 944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1234470662aeda854724e00aa02f86ad_JaffaCakes118.dll,#12⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888