Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
acf33473dce0b784479f366ebac424bc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acf33473dce0b784479f366ebac424bc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
acf33473dce0b784479f366ebac424bc_JaffaCakes118.dll
-
Size
121KB
-
MD5
acf33473dce0b784479f366ebac424bc
-
SHA1
275760d40ccdadee76da305db92aef4edf71eab1
-
SHA256
5154dcfedc8d82e0f8ba54f7a92d2841411bb181188569a62609fcbadfb04657
-
SHA512
95f4f26d5dd394fc751d5573b5f4da4dd0f06c72a0918d3166661fcb8d137451a1a36779d0e12778377bc1f6119a9b301bf27fb0e7b07bd6fe2472ebe2fe8f86
-
SSDEEP
3072:XC4m03cj/UtPWSqbMhBVY1tMwiHbgqv+:XPm03+UtPWR03Y1t
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ernel32.dll rundll32.exe File created C:\Windows\SysWOW64\ernel32.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30 PID 2560 wrote to memory of 2052 2560 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acf33473dce0b784479f366ebac424bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acf33473dce0b784479f366ebac424bc_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052
-