Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
875f0b65fed21635da261206f2f3c67a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
875f0b65fed21635da261206f2f3c67a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
875f0b65fed21635da261206f2f3c67a_JaffaCakes118.dll
-
Size
28KB
-
MD5
875f0b65fed21635da261206f2f3c67a
-
SHA1
f78eb3c43019ba144af78c057573970ed0687835
-
SHA256
d0ece9fe57037497440ca350272764c6100797a7a1ebaafd4b2b1f981f9dfb9d
-
SHA512
a6d95a74f7a98b469328205af12dafba3b87ffd6f49637cca59d191802f469c5eb926923feee0160d06748b054eea166f04b922aa79f582a30006b5178155970
-
SSDEEP
384:rqFVDz6bErWuw8ZJxFWsvkLrQkQT5YM/BVQdVDxfNPHPPsNFOhYe8pHWM4+lD9Zy:rqFR6uBkrrwKM/BVQJBsNFAWFzvqI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Office = "C:\\Windows\\system32\\msoff.exe" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4788 1820 rundll32.exe 84 PID 1820 wrote to memory of 4788 1820 rundll32.exe 84 PID 1820 wrote to memory of 4788 1820 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875f0b65fed21635da261206f2f3c67a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875f0b65fed21635da261206f2f3c67a_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4788
-