Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
2d67639eaa3e6e19d26ff2f39d67dd20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d67639eaa3e6e19d26ff2f39d67dd20_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2d67639eaa3e6e19d26ff2f39d67dd20_JaffaCakes118.dll
-
Size
451KB
-
MD5
2d67639eaa3e6e19d26ff2f39d67dd20
-
SHA1
1424d302cc31eb1911e16e2ae23b8b2c4bf1da9e
-
SHA256
9ba77bb7aa0466acbdbd19a1f7695e17ca642f059ed1197403641a7b98dcae96
-
SHA512
65deb6b7f8d09e5962d0bdd9f27cd4b9da5f3c2b1dd0a48f87f27cae751f585987f2c100d6cdf7248e0068dd6a63c4a202a270ec0052c8d2a26e50f0c2612fcd
-
SSDEEP
6144:J8hPTzqmesnHJ9a6JwSq0ZSgkFsfqQ0p5cm7a4PqGfUvc0tnWgyWkqc:J8lzl9q6/S5F7DXbdUU0AHWkqc
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{71A4C87FD5201410C065A4BD3BC63BA4}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\8D0E.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 5112 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2496 2432 rundll32.exe 83 PID 2432 wrote to memory of 2496 2432 rundll32.exe 83 PID 2432 wrote to memory of 2496 2432 rundll32.exe 83 PID 2496 wrote to memory of 5112 2496 rundll32.exe 87 PID 2496 wrote to memory of 5112 2496 rundll32.exe 87 PID 2496 wrote to memory of 5112 2496 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d67639eaa3e6e19d26ff2f39d67dd20_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d67639eaa3e6e19d26ff2f39d67dd20_JaffaCakes118.dll,#12⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\853D.tmp3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD5725af2fc485be4cea41e3df53263a59b
SHA1aa95ae0e35549eded59e03a5ecf2d7d04d2230ad
SHA256981a959acf89a0609324d2e62280a92f07e0a4ebf7fa9f45fcd4ab0b6ccde4a4
SHA512bc8eab5e7bdd7344cf98192af5e69df716be2b13e6657adbbb32b7efda3269478b5acf3805adaf7b83d59a681dee639cb5de77dc965245f662d5463495c35190