Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
4198ac1dc34de77ab8ceac3c9a25480e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4198ac1dc34de77ab8ceac3c9a25480e_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
4198ac1dc34de77ab8ceac3c9a25480e_JaffaCakes118.dll
-
Size
525KB
-
MD5
4198ac1dc34de77ab8ceac3c9a25480e
-
SHA1
f8fb1264a292aecb6c2bf5c5d4f3e199e3a822ad
-
SHA256
8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292
-
SHA512
37dd3c50283daa7be1fb831820d273b7663dddce4d98c87c8d08864fac2dc00daf243ca6e50e028d4f04262160f5dea9a98000cffb67d70c07875d3fc2e4c47c
-
SSDEEP
12288:4sskVmMfu4CN1NYPkDbkuN90VOR47wn2vTPHXL2n2UT1p0:v0NYPkEuz0VOR47w2rvXyD0
Malware Config
Extracted
hancitor
1910_nsw
http://newnucapi.com/8/forum.php
http://gintlyba.ru/8/forum.php
http://stralonz.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 14 1828 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 924 wrote to memory of 1828 924 rundll32.exe rundll32.exe PID 924 wrote to memory of 1828 924 rundll32.exe rundll32.exe PID 924 wrote to memory of 1828 924 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4198ac1dc34de77ab8ceac3c9a25480e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4198ac1dc34de77ab8ceac3c9a25480e_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1828
-