Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 20:36
Behavioral task
behavioral1
Sample
759fdf1e6afe36df84c5a2df7751735b_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
759fdf1e6afe36df84c5a2df7751735b_JaffaCakes118.dll
-
Size
80KB
-
MD5
759fdf1e6afe36df84c5a2df7751735b
-
SHA1
2bed2e262e6fbfb91915eb757f9e222ade50082b
-
SHA256
5e7bd63e9ec1b96e7468840fb7d4f2e5ba8f42bcf066c9bda97d704ff856a0a7
-
SHA512
9cd38fa0df6465101ea0248081290237a058a66a3d8994489c15b8bfea83ae0955d9534492a8b2a57d334c8a32304580ee692943d062911fa6b60b52656ec925
-
SSDEEP
768:WMFz18Cn+Im/aVtQeUMQ9adr3a2Vru5dCnrcqbGfzHWxZ://m/2tFUMRdrK2VydCrhSfyxZ
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2716-0-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon behavioral2/memory/2716-1-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon -
Blocklisted process makes network request 50 IoCs
Processes:
rundll32.exeflow pid process 17 2716 rundll32.exe 26 2716 rundll32.exe 29 2716 rundll32.exe 31 2716 rundll32.exe 32 2716 rundll32.exe 34 2716 rundll32.exe 40 2716 rundll32.exe 41 2716 rundll32.exe 42 2716 rundll32.exe 43 2716 rundll32.exe 44 2716 rundll32.exe 45 2716 rundll32.exe 59 2716 rundll32.exe 60 2716 rundll32.exe 61 2716 rundll32.exe 62 2716 rundll32.exe 63 2716 rundll32.exe 64 2716 rundll32.exe 65 2716 rundll32.exe 66 2716 rundll32.exe 67 2716 rundll32.exe 72 2716 rundll32.exe 76 2716 rundll32.exe 77 2716 rundll32.exe 78 2716 rundll32.exe 79 2716 rundll32.exe 80 2716 rundll32.exe 81 2716 rundll32.exe 82 2716 rundll32.exe 83 2716 rundll32.exe 84 2716 rundll32.exe 87 2716 rundll32.exe 89 2716 rundll32.exe 101 2716 rundll32.exe 102 2716 rundll32.exe 104 2716 rundll32.exe 105 2716 rundll32.exe 106 2716 rundll32.exe 107 2716 rundll32.exe 108 2716 rundll32.exe 109 2716 rundll32.exe 110 2716 rundll32.exe 111 2716 rundll32.exe 112 2716 rundll32.exe 113 2716 rundll32.exe 114 2716 rundll32.exe 115 2716 rundll32.exe 116 2716 rundll32.exe 117 2716 rundll32.exe 118 2716 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1524 wrote to memory of 2716 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2716 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2716 1524 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759fdf1e6afe36df84c5a2df7751735b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\759fdf1e6afe36df84c5a2df7751735b_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2716