Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
8da44fa47272c1f1668558b08daddfe2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8da44fa47272c1f1668558b08daddfe2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8da44fa47272c1f1668558b08daddfe2_JaffaCakes118.dll
-
Size
322KB
-
MD5
8da44fa47272c1f1668558b08daddfe2
-
SHA1
a72624476f412dd9542f1be96c0633f225f306b1
-
SHA256
a9a70ee9a1fbbf19cdd3e4f3a344108161b5545db25bae695ce28cadfe9c252c
-
SHA512
edbb363a4a7aad96a0f4096760ea175cf767f8a6680a74ed74a1820dcdbb68535dc00f9c05d69194352c85bbbe09ef084e4194fb536892e3915eed00f062a9e9
-
SSDEEP
6144:q9uk46rNMIhJLljsvo/CVEDpHUu63iTB5Z0c4r/:qUk46rNMoJ5jsiCGDpUu63iTzZ0dr
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2812 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30 PID 2840 wrote to memory of 2812 2840 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8da44fa47272c1f1668558b08daddfe2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8da44fa47272c1f1668558b08daddfe2_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD575327270b8a5fbf07616cfde5339df8f
SHA19f2bc48a9df8e646671ed5abcbc7ba52cc3ac502
SHA256295edffb45a995047f3c47728edc147e9c29bd27581ede16cbf24095518858b1
SHA512867b898020435ff5efdd8443edc81f7dd4d1c11014acb4fd5f197313394c55a011e37f1d3e28e7510ff6894e188f03ad707b9b6903a23f2a05b72489c046cfc1