Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
b14799ab0ba4ca5d2a4ce06c22a8a73d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b14799ab0ba4ca5d2a4ce06c22a8a73d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b14799ab0ba4ca5d2a4ce06c22a8a73d_JaffaCakes118.dll
-
Size
27KB
-
MD5
b14799ab0ba4ca5d2a4ce06c22a8a73d
-
SHA1
ae9c7a8a141f38c48598df43e1010761120c99dc
-
SHA256
b5e47da1258609ffaf779e6837f637951bd2bd7999a165415759eda45f609910
-
SHA512
c1c1bc112fbfa0fdc2c3145793ece3c510dfaac3e993ab5b1842b2e512be8fc7bfd324fd7382dcfa8d6a95e1ca828e9a0ab604f69f4dfb1d1173e57fe11f9fb0
-
SSDEEP
384:W1opTURBjOpfctUiZr+JJOqnpeBtPw/fqiHKGEu7Pwyv:W1oxOKpf2UigC4HqmKGpDf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30 PID 2632 wrote to memory of 1076 2632 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b14799ab0ba4ca5d2a4ce06c22a8a73d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b14799ab0ba4ca5d2a4ce06c22a8a73d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1076
-