Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
2761582aaa87edb8dbe31b9a67c7894d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2761582aaa87edb8dbe31b9a67c7894d_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2761582aaa87edb8dbe31b9a67c7894d_JaffaCakes118.dll
-
Size
307KB
-
MD5
2761582aaa87edb8dbe31b9a67c7894d
-
SHA1
1701efe3e7be1d39a4ff86e2ce9d8570c9a02ba1
-
SHA256
f549bc7cb548390e624da9de41a6c0d6abde996f40c16fec0006dcb65542cf47
-
SHA512
2663c74b57cae3584db8242b42e598bfd45759090a7354cc4aefac324a053dc7806f7e97b8127d5456fb7a0eaf412863ed018df13b43a0d538139b6f2af679c5
-
SSDEEP
6144:OTF+itsxsCPF0vNGwgsV5GebzRceV47K+nWsoL19X2Q8K:OTF+iCxsoWxgw5zdp47Zn1Q8K
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c005c00550073006500720073005c005c00410064006d0069006e005c005c0041007000700044006100740061005c005c004c006f00630061006c005c005c00540065006d0070005c005c00320037003600310035003800320061006100610038003700650064006200380064006200650033003100620039006100360037006300370038003900340064005f004a006100660066006100430061006b006500730031003100380000000000 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1192 4460 rundll32.exe 83 PID 4460 wrote to memory of 1192 4460 rundll32.exe 83 PID 4460 wrote to memory of 1192 4460 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2761582aaa87edb8dbe31b9a67c7894d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2761582aaa87edb8dbe31b9a67c7894d_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Authentication Package
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1192
-