Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
ad3fc37e71c1cd1a3266b992c7e17894_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad3fc37e71c1cd1a3266b992c7e17894_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad3fc37e71c1cd1a3266b992c7e17894_JaffaCakes118.dll
-
Size
126KB
-
MD5
ad3fc37e71c1cd1a3266b992c7e17894
-
SHA1
bfd4702c8a0738a417c1de88c11418bb8a78b0a2
-
SHA256
71a44672660920f9cfb50451cfc8f64b3ed9cec73e763031dbcee044f3bd8a73
-
SHA512
7b5d6236a171d65ecef08b342dd502e14ee68cb4475a36c3b15a1f0180c11fca233cbdc1483e8765630f92cd33bddeb02da8ca6f43afe6b159fba6984df3ad6e
-
SSDEEP
3072:nk3I/m/rudDG+6XjfLgAUXDoBtMX8mQXnkY:k3Iu/oDn0jfLsToBqXH
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2104 rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\f8a8a880\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\3F22.tmp" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2104 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2104 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30 PID 1760 wrote to memory of 2104 1760 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3fc37e71c1cd1a3266b992c7e17894_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3fc37e71c1cd1a3266b992c7e17894_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2104
-