Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll
-
Size
92KB
-
MD5
877ff02ce4ba35e95edafaed55c6c3c3
-
SHA1
68f02df2238d4fc057c0c9b74d9d2f10f6e39ba7
-
SHA256
231f3d3ec32f4f9cad8c771fdff6f860699d8f3e5ddffc5482bbdc1d4acaff58
-
SHA512
5d0bf0c9a7a7b789d65043a3c0215ca349ad4f2defe3fb8e93f1ef5337ab39e47466f59e5be24f2b38b90eda86590b1c5065fc46b6a4c15e4654d9e6de373ec8
-
SSDEEP
1536:ZzS6fAl5EIX48CybB4QYYF4wQWkKt6rioMOSuX7lpnFsuvLdsef:Zznc55X8iBUkfkKt6ri1uX7zVvJse
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eganozuneseyome = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1952 wrote to memory of 1756 1952 rundll32.exe 30 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31 PID 1756 wrote to memory of 2208 1756 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\877ff02ce4ba35e95edafaed55c6c3c3_JaffaCakes118.dll",iep3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-