Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll
-
Size
120KB
-
MD5
ad509f66ecec0266ea9f725fe499f743
-
SHA1
9e897ae26a25e7a586879d21e6bb0e72cfe997cd
-
SHA256
f39835fcc2d5dcfd78211b2b4b0fc9074c604c4e6ed3912d781f692b8dcf6c56
-
SHA512
b44a1bfe64bc5107726b507f829458ea0038c48fd4995973af47fa8ac6ac27f859a076cc114f05ef6b492b83bd3f3ef3a193f8bad2ec413844105d2af1c090d0
-
SSDEEP
3072:dhqz3mXaokxzQQIugcdL8cZtl+hpqMKOlRXJdgWuLh2eDMkkn:mz3mXexpIzWD0vgZLhHQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dtenapaf = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe 1520 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1520 rundll32.exe 856 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1520 1884 rundll32.exe 84 PID 1884 wrote to memory of 1520 1884 rundll32.exe 84 PID 1884 wrote to memory of 1520 1884 rundll32.exe 84 PID 1520 wrote to memory of 856 1520 rundll32.exe 97 PID 1520 wrote to memory of 856 1520 rundll32.exe 97 PID 1520 wrote to memory of 856 1520 rundll32.exe 97
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\ad509f66ecec0266ea9f725fe499f743_JaffaCakes118.dll",iep3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:856
-
-