Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
393da8fa34746f0ade9c11804f7d0809_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
393da8fa34746f0ade9c11804f7d0809_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
393da8fa34746f0ade9c11804f7d0809_JaffaCakes118.dll
-
Size
29KB
-
MD5
393da8fa34746f0ade9c11804f7d0809
-
SHA1
670242370c72c6a11b7eadfc4d5f8a167916c6b4
-
SHA256
af09269b51f1a02a29e965cfeb68788b648363821d87cc9d724627d0e257dc58
-
SHA512
1233838be9c2184ecfc30a260832baead3242c532b1ccadbdebabd9afe1fe0586a221018dfe40abd6e0065907e3c17f03116ad9eca7ca194fe0aa2e8ff89e486
-
SSDEEP
384:hFJlTn+BNmNpbgic+axlpnMdtfROh/H2AGafONnEb6iwgMRDpM:NlqDoRfaNnMdVm+AjW+CP
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\servises = "C:\\Windows\\system32\\servises.exe" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\servises = "C:\\Windows\\system32\\servises.exe" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run rundll32.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 4268 rundll32.exe 19 4268 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\servises = "C:\\Windows\\system32\\servises.exe" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\servises = "C:\\Windows\\system32\\servises.exe" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4268 3352 rundll32.exe 83 PID 3352 wrote to memory of 4268 3352 rundll32.exe 83 PID 3352 wrote to memory of 4268 3352 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\393da8fa34746f0ade9c11804f7d0809_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\393da8fa34746f0ade9c11804f7d0809_JaffaCakes118.dll,#12⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4268
-