Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
766afa3661910d92a100407b32bf346f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
766afa3661910d92a100407b32bf346f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
766afa3661910d92a100407b32bf346f_JaffaCakes118.dll
-
Size
1.5MB
-
MD5
766afa3661910d92a100407b32bf346f
-
SHA1
952de9cd89d1bb54a29b08bb7695895fe322fa56
-
SHA256
8ee2f605987e0f4ad04dedefa5d830ddf35699b1c706245024ff7a0ef8e5e32f
-
SHA512
8d10c5e0b23bb5b992d8063f97a9e19de3b779b92a22163f4db975515245f03cca1962eff5b5880e912e89446dfbfee5e6d43b0d098b4de0fd451a3bd48dbe3b
-
SSDEEP
3072:7yIQN9mo8gaaP3ZoDRKCaaokR2zojjHLyORm+WVW9OmJIWFN:PQvbaEoFjryD0J
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mssfc.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31 PID 2476 wrote to memory of 1412 2476 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\766afa3661910d92a100407b32bf346f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\766afa3661910d92a100407b32bf346f_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1412
-