Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
a1d2f727f534a6cf8781544dfef3d54c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1d2f727f534a6cf8781544dfef3d54c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a1d2f727f534a6cf8781544dfef3d54c_JaffaCakes118.dll
-
Size
49KB
-
MD5
a1d2f727f534a6cf8781544dfef3d54c
-
SHA1
9cf16249b2e62b0bb474a10355034c3ae281d37a
-
SHA256
3663596ffbc9bd14ea20db0e01014bdff81a3ce9e7f252c04bc1da88facbf690
-
SHA512
560bd73b260500fcb39c70aa76d92b7d9442df01d0aa719694b9aa4557220fbf431d82bcf3e23068c678dbccc3f4e8bd87488ac1659707d5135a13cc9bf31bd6
-
SSDEEP
768:GLHQamPcxT6AH1pptBK/1mKaurffuxziJ1sjs4pf2s1u6Cl:yQDPcl6KG/0K9fOtG6Cl
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jehiniki.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\botofiwo rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4276 rundll32.exe 4276 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 4276 388 rundll32.exe 86 PID 388 wrote to memory of 4276 388 rundll32.exe 86 PID 388 wrote to memory of 4276 388 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1d2f727f534a6cf8781544dfef3d54c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1d2f727f534a6cf8781544dfef3d54c_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4276
-