Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 15:54
Behavioral task
behavioral1
Sample
b416369b6732d0b6f7034666aba56f1a_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
General
-
Target
b416369b6732d0b6f7034666aba56f1a_JaffaCakes118.dll
-
Size
53KB
-
MD5
b416369b6732d0b6f7034666aba56f1a
-
SHA1
52fac0b3fb05f0d1e2add9a0b14efbf3a542ddaa
-
SHA256
137fba8dfe3f0cd0b3a75aaf979bdb95e3b7634f5f0e72e5fe4856848249a8f4
-
SHA512
d3f68e738dc02e1114389661463ba69ca90ae35106cb2714eddcd34eec1960bcfdb479dbf92aae2ee25c581985dbb2f8132259aff0918894f6ace018e32506cd
-
SSDEEP
1536:BEC96TmEMgOLu6YvieeBBD2Le95YtD18T5ld:BECIMgOLuO2aXYtDiTDd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1488-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1488 4796 rundll32.exe 83 PID 4796 wrote to memory of 1488 4796 rundll32.exe 83 PID 4796 wrote to memory of 1488 4796 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b416369b6732d0b6f7034666aba56f1a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b416369b6732d0b6f7034666aba56f1a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1488
-