Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 15:09
Behavioral task
behavioral1
Sample
8ad9246da0bb328d0c25f11a223db169_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ad9246da0bb328d0c25f11a223db169_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8ad9246da0bb328d0c25f11a223db169_JaffaCakes118.dll
-
Size
54KB
-
MD5
8ad9246da0bb328d0c25f11a223db169
-
SHA1
086d119a8c7316c5fd5678aea6dcdaa59e8481fe
-
SHA256
25171f2b29a1b17843ba35e15664891a86588cbaba13ab3cf128f067d74a865b
-
SHA512
83cda9cdb05c0137d4716689c8d6c66891503a7a1f3170bfd477d3c09c9787148caab8010111bf37426e9be4f63a92de488eb1d42407fb0dddfcb68bdb18bb8d
-
SSDEEP
1536:tXLzVPiSBsRt9k6Qv4RmPMzJ9XV3h9eOY9dnK8ZWTZVCf:5VPBsRt9k684RmPMN9XxvJj1Zwf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MutexKey = "C:\\Program Files\\StormDate\\hicroexamin.exe" rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\StormDate\hicroexamin.exe rundll32.exe File opened for modification C:\Program Files\StormDate\hicroexamin.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 rundll32.exe 1752 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1752 1644 rundll32.exe 84 PID 1644 wrote to memory of 1752 1644 rundll32.exe 84 PID 1644 wrote to memory of 1752 1644 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ad9246da0bb328d0c25f11a223db169_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ad9246da0bb328d0c25f11a223db169_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752
-