Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
76d51697dcbd89da33ec1b13a8fbbee2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76d51697dcbd89da33ec1b13a8fbbee2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
76d51697dcbd89da33ec1b13a8fbbee2_JaffaCakes118.dll
-
Size
264KB
-
MD5
76d51697dcbd89da33ec1b13a8fbbee2
-
SHA1
17139a1d5f57dea9d036fe217bcba2c7bb1f5695
-
SHA256
66d45219a9ec0b87abf2a0e64aee35cf96fce97fe502d8c68a40bfd30e940dc0
-
SHA512
695b97a3a0695e3238d6d477af1ebc07d132ee4c7439d898fed8a3ad8535c9825a296e1d40d719064eae522f6cb1c340bcf6f8a4adea2af170106fa25e40834e
-
SSDEEP
3072:sOnRUx0nlnat3D9feiWHcnhelShQOLcTi642YjkPoycADUk/OLJDye0Ata5AsQJ/:sO80nlaWHchelShzLkipCo3ADUjhssX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2692 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2692 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2284 1288 rundll32.exe 84 PID 1288 wrote to memory of 2284 1288 rundll32.exe 84 PID 1288 wrote to memory of 2284 1288 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76d51697dcbd89da33ec1b13a8fbbee2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76d51697dcbd89da33ec1b13a8fbbee2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x384 0x38c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2692