Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
a4bc8bc761a260f476ef5217c25f30e5_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4bc8bc761a260f476ef5217c25f30e5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a4bc8bc761a260f476ef5217c25f30e5_JaffaCakes118.dll
-
Size
36KB
-
MD5
a4bc8bc761a260f476ef5217c25f30e5
-
SHA1
6c235b521d1fb15821d826690073e5d08c8c902e
-
SHA256
453e1357333c43d685f60ca9a2654feb5ceaac80f039daaba9ebed94dcb78889
-
SHA512
fcbec9cf83f3e63c4e3d36e095cf084ce787dcde53e805f605acfd3054562a1870fffe835c8d47c6fe666cb653bb1d8998312efec48fbb921b4fe9079b16b279
-
SSDEEP
768:vMF1Bo7W8u6q/hm7Ytw74gDJv+lXkJuTIMtUc:mo7W8uj5mUKVlv+6J4Wc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2480 wrote to memory of 884 2480 rundll32.exe 87 PID 2480 wrote to memory of 884 2480 rundll32.exe 87 PID 2480 wrote to memory of 884 2480 rundll32.exe 87 PID 884 wrote to memory of 2440 884 rundll32.exe 88 PID 884 wrote to memory of 2440 884 rundll32.exe 88 PID 884 wrote to memory of 2440 884 rundll32.exe 88 PID 2440 wrote to memory of 2412 2440 net.exe 90 PID 2440 wrote to memory of 2412 2440 net.exe 90 PID 2440 wrote to memory of 2412 2440 net.exe 90 PID 884 wrote to memory of 3672 884 rundll32.exe 91 PID 884 wrote to memory of 3672 884 rundll32.exe 91 PID 884 wrote to memory of 3672 884 rundll32.exe 91 PID 3672 wrote to memory of 4828 3672 net.exe 93 PID 3672 wrote to memory of 4828 3672 net.exe 93 PID 3672 wrote to memory of 4828 3672 net.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4bc8bc761a260f476ef5217c25f30e5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4bc8bc761a260f476ef5217c25f30e5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\net.exenet stop winss3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winss4⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
C:\Windows\SysWOW64\net.exenet stop OcHealthMon3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OcHealthMon4⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-