Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
72e93f8bc3838094e2a6239b405b90b4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72e93f8bc3838094e2a6239b405b90b4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
72e93f8bc3838094e2a6239b405b90b4_JaffaCakes118.dll
-
Size
11KB
-
MD5
72e93f8bc3838094e2a6239b405b90b4
-
SHA1
4300d410ee89f5af9fe8b971afdd8ee2e2778614
-
SHA256
1f0217fd95b6fc4b4147e7631bbdee6265749df358e622e0e3ef2ad6c4ffe3cf
-
SHA512
a4a59cfce2cc11fbc34041de6f292063e51de4391a7360488cf8cda416273585b0f1d4d2410b900eb5dafa517eb65a8d445511f25a493f09704b32bae776ac19
-
SSDEEP
192:7xBSpwlu0R7Rcmrzf8zjmk5KkCQkw5X9ZcNVqIN9pzS5uChOPsYkgUw9nF:7xAKluWKm3fuik5Np58zpNrS5eUC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4512 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4512 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4512 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4512 3536 rundll32.exe 84 PID 3536 wrote to memory of 4512 3536 rundll32.exe 84 PID 3536 wrote to memory of 4512 3536 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e93f8bc3838094e2a6239b405b90b4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e93f8bc3838094e2a6239b405b90b4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4512
-