Analysis
-
max time kernel
79s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
9571b24f5ae3a09ab56acfcfeeb41b42_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9571b24f5ae3a09ab56acfcfeeb41b42_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9571b24f5ae3a09ab56acfcfeeb41b42_JaffaCakes118.dll
-
Size
35KB
-
MD5
9571b24f5ae3a09ab56acfcfeeb41b42
-
SHA1
83f0351320771e77328ca05014fc42a23754cef1
-
SHA256
9e07c78e3ebb3d8f1b5214fcab06134709f5dfe486fd802cdbd300c52eabd4e9
-
SHA512
b826280c286928dc9d27ef977acda0fe89105322136df7e72ffaca0552659c3b8a9a3bab982dc34d3aee267a1a007c8fd58524a7a10ed0d7771516c6425d9375
-
SSDEEP
384:72DYxzek8YHcOM8pNOkIdUwsZfJBbD1aHOVPb4XT4MtD+gGZakieJ6b:72Exz5N9IdUwsZfJBbxaHOVPm9D+RZ5g
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ergfwe.dll rundll32.exe File created C:\Windows\SysWOW64\sergy.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\sergy.dll rundll32.exe File created C:\Windows\SysWOW64\ergfwe.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe 3640 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3640 1612 rundll32.exe 88 PID 1612 wrote to memory of 3640 1612 rundll32.exe 88 PID 1612 wrote to memory of 3640 1612 rundll32.exe 88 PID 3640 wrote to memory of 3444 3640 rundll32.exe 56 PID 3640 wrote to memory of 3444 3640 rundll32.exe 56 PID 3640 wrote to memory of 2204 3640 rundll32.exe 38 PID 3640 wrote to memory of 2204 3640 rundll32.exe 38
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2204
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9571b24f5ae3a09ab56acfcfeeb41b42_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9571b24f5ae3a09ab56acfcfeeb41b42_JaffaCakes118.dll,#13⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640
-
-