Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
6fbd58ecb9c287702d94eeec487c7a67_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fbd58ecb9c287702d94eeec487c7a67_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fbd58ecb9c287702d94eeec487c7a67_JaffaCakes118.dll
-
Size
7KB
-
MD5
6fbd58ecb9c287702d94eeec487c7a67
-
SHA1
214bfbe47a884dce4ee916e98182d30d08d1b0c3
-
SHA256
06602ba4ea1ae6fd7a9f722213278efed7ae9d962bf6e41042a173e4f2d80a7e
-
SHA512
9dc4ece8405c9b39cd7273fc4a9168a356e58284b77c47873335a2142869100a0d449a706fee07cd01dcc18ba2bf04882d118f65c68577d04bc7229a50641b1e
-
SSDEEP
96:ICP6g86tT9e7f5RwxzNiElril4+gG9/bq3Xcs+k4H:TNer5RwxzNHlrq4+gG9/bq3XcsX4
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31 PID 2232 wrote to memory of 1048 2232 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fbd58ecb9c287702d94eeec487c7a67_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fbd58ecb9c287702d94eeec487c7a67_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1048
-