Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b51d6bff502a277bc477a834448006f9_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b51d6bff502a277bc477a834448006f9_JaffaCakes118.dll
-
Size
28KB
-
MD5
b51d6bff502a277bc477a834448006f9
-
SHA1
d0070e44ff1380e9ee126d7390bea8a08ca44cd4
-
SHA256
5752c4372d9a3d2ad4ed36f03360210060aeb8cbf575424167aef1b64f14ac57
-
SHA512
f982f38d243405581cd4ce2699c37437d5713f843e6aac618a97235d9e32dcc7d14d5720f778d51aba251bf712bfa31a61f2e8ac427a0b9d6f0b8a0b9f750224
-
SSDEEP
192:7wUFlYy4D4osmIeRGNDNQ9z1r4mSkQGurENWwD85nU:tlh+4TPmG50z1r4mSuurENWM8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30 PID 2480 wrote to memory of 2792 2480 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b51d6bff502a277bc477a834448006f9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b51d6bff502a277bc477a834448006f9_JaffaCakes118.dll,#12⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:2792
-