Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
76adea23efdcef748ec2c4574ac8bebb_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
76adea23efdcef748ec2c4574ac8bebb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
76adea23efdcef748ec2c4574ac8bebb_JaffaCakes118.dll
-
Size
306KB
-
MD5
76adea23efdcef748ec2c4574ac8bebb
-
SHA1
1cd237f1cd06462e69c78e1b7582065d8b0ec809
-
SHA256
0ee548b49402af4d43504be3e3cb00141e21f441611b6b9b38512f115d540129
-
SHA512
5a640e8ef59bc8e839e410c50b672f3d924f3d840b5b0d00a6b095ab041d32b93aa200af3b1a168e65a93d2b604b5a4f9bc013ef3a3e8cb02a63965338288d20
-
SSDEEP
3072:dVeUJXX4xjmKWlJG9aOwTomYGSArKzpJYzvUjiLM9IgUWp6rUzfOhKfgcjjPitzV:2UWSlbMp1eW6rhmrM/S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2384 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30 PID 1916 wrote to memory of 2384 1916 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76adea23efdcef748ec2c4574ac8bebb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76adea23efdcef748ec2c4574ac8bebb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2384
-