Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll
-
Size
124KB
-
MD5
acd9e0bd01ec1be4e8cc111cbb8b5e09
-
SHA1
b75a8c821f40d9f48960a37fe3fc604b35e70288
-
SHA256
fbfa6ce1830b2279b6641ff504922f72a7aef81b639d2464717f8fcb2bc50fd0
-
SHA512
b5947cf4d5d9262ba6b12a1012a48963946bd9beda8e6e9834307fecb04f00922dcb4fbe420ee966e2a2ab14411be8a1d75d208b80d6db24ab58cc213f1f75f2
-
SSDEEP
3072:IpxCNzwJI2Q2ztgogxfutVOlRXJdgx0b+LKtP:mQzwG25gog0wgxnGp
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ddunafujaho = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1096 rundll32.exe 1096 rundll32.exe 1096 rundll32.exe 1096 rundll32.exe 1096 rundll32.exe 1096 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1096 rundll32.exe 2140 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 2116 wrote to memory of 1096 2116 rundll32.exe 29 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30 PID 1096 wrote to memory of 2140 1096 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\acd9e0bd01ec1be4e8cc111cbb8b5e09_JaffaCakes118.dll",iep3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140
-
-