Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 22:46
Behavioral task
behavioral1
Sample
b55958decf28ef6eb282c1677db8e737_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b55958decf28ef6eb282c1677db8e737_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b55958decf28ef6eb282c1677db8e737_JaffaCakes118.dll
-
Size
103KB
-
MD5
b55958decf28ef6eb282c1677db8e737
-
SHA1
e25b22465a784eb09f928bf04a0734be54757fff
-
SHA256
39c6ae5090aa072303ef24b7ded296b8fa37a5c92e9e1a0c6acdd159296b4159
-
SHA512
7d6b783d4b54d3aaf4f43bac8f86c63280fb98d0b23503a547e5eb4bb3a5d8dbf32232454ec3051cd979732fdce8c50c84320eb81f0e6a6c33def46dc065e078
-
SSDEEP
1536:Is+Jc7y3qPbsm8QfLpcILGoka7V2uJp1VcM/dfh7EPOZ8IergD31:B+absmUul0uJXVb/Fh7EPe8IergD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 rundll32.exe 2280 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30 PID 2520 wrote to memory of 2280 2520 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b55958decf28ef6eb282c1677db8e737_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b55958decf28ef6eb282c1677db8e737_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280
-