Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll
-
Size
41KB
-
MD5
886a09768f8eee7ad5580d341ce7bb6a
-
SHA1
598a88002c08c53bae3fa96baf41d77a298fef87
-
SHA256
f7402e1146de9b11953fe2db5032207c5072dec81d6d3d9c341f1bf174d0d4f9
-
SHA512
5e31f6ed58b43f183237a7e2218e0c5d8acc28197dde852087ff46c3f484d55c9c5edb658eee0eec1e8c96686bb81d5cd9d2789712c7b90bf0981f8466ea7cbe
-
SSDEEP
768:HqoeN/bg30M0nv46QKqUT+m3lY76Nh1TPF7+7GquAiDG14j7l8j:H7eN830M0nv46ibSlY78h146qCDGqj7m
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{55A11BC1-B32B-EAA2-A12D1-DCA1214B41AC} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55A11BC1-B32B-EAA2-A12D1-DCA1214B41AC}\stubpath = "C:\\Windows\\hpupdate.exe" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29 PID 2616 wrote to memory of 2068 2616 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886a09768f8eee7ad5580d341ce7bb6a_JaffaCakes118.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2068
-