Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
aba6c88875e46e38b7476da8703a7af5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aba6c88875e46e38b7476da8703a7af5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
aba6c88875e46e38b7476da8703a7af5_JaffaCakes118.dll
-
Size
124KB
-
MD5
aba6c88875e46e38b7476da8703a7af5
-
SHA1
ae44b45c50a16409dc78b1948f1698bebb6a484f
-
SHA256
6e61cf999538623973dba834bfc561b934cc3a529ccba36ef4feb7812cf1d0f4
-
SHA512
70b1420b70bf608ef5064ee6280b6c3cd8fd5f86a5aa943a575a12b016ad961ff08b641d8748e89ddd8fdcb0004dcd293b0d4039bf4b8023ec74516001bf0bb1
-
SSDEEP
3072:NyFswNN9uXCr+owu2hk65xd8pk+zWfs/bGVO:NeswNNDiowu2K6/d8DWfs/bGV
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1632 rundll32.exe 7 1632 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1632 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30 PID 1656 wrote to memory of 1632 1656 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aba6c88875e46e38b7476da8703a7af5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aba6c88875e46e38b7476da8703a7af5_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632
-