Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
-
Size
1.0MB
-
MD5
a27bfd81b60c5b7ab68b3e1de7d1d6a4
-
SHA1
55b9a726e1074d7f586a750123abcd3b696d75cc
-
SHA256
257f7f24ac035ba6f49a63679e175576224dc72a6bfff27e3aff99a9e0d40c61
-
SHA512
fb6f05ab54e5f068e04d07fb4b5520d8a9db60fd6e7be1d5e5c44ff31a0cd4450944a8a3f85554cdff637a78b07df861e161b6cf3c687f038d0927f531913777
-
SSDEEP
24576:wQN60LA3NE9tKT17UJKW/SYv6vxHBaVGyBknm:wQNUNyO16uvqkm
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2092 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2092 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30 PID 2376 wrote to memory of 2092 2376 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2092
-