Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b71681296871f06e38184d42f6138f33_JaffaCakes118.dll
-
Size
166KB
-
MD5
b71681296871f06e38184d42f6138f33
-
SHA1
f5fe7fc873fbe89df967a67cf78e953f65baa04e
-
SHA256
235d50259372f7c53c7b5500efd19e506192f1e0ba702d5c320e2c05213f465f
-
SHA512
7af133bb7bf664be2f6ee19e5d193a87205306f135f4f4f668c0369818a9ef0903937af9540a53a2dd5bf51a16328f36a155e26985215bbd5c12e1b544bf9ef9
-
SSDEEP
3072:IGUmn+79jdoJ51BsV0PHn60uawFMRswKFev9gEkIAyZ8uYLADHbsz:IGU3Rdoj1BRn6twK8kIbZvUib
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1236 2308 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2308 rundll32.exe Token: SeSecurityPrivilege 2308 rundll32.exe Token: SeLoadDriverPrivilege 2308 rundll32.exe Token: SeSystemProfilePrivilege 2308 rundll32.exe Token: SeSystemtimePrivilege 2308 rundll32.exe Token: SeProfSingleProcessPrivilege 2308 rundll32.exe Token: SeIncBasePriorityPrivilege 2308 rundll32.exe Token: SeCreatePagefilePrivilege 2308 rundll32.exe Token: SeShutdownPrivilege 2308 rundll32.exe Token: SeDebugPrivilege 2308 rundll32.exe Token: SeSystemEnvironmentPrivilege 2308 rundll32.exe Token: SeRemoteShutdownPrivilege 2308 rundll32.exe Token: SeUndockPrivilege 2308 rundll32.exe Token: SeManageVolumePrivilege 2308 rundll32.exe Token: 33 2308 rundll32.exe Token: 34 2308 rundll32.exe Token: 35 2308 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2292 wrote to memory of 2308 2292 rundll32.exe 28 PID 2308 wrote to memory of 1236 2308 rundll32.exe 29 PID 2308 wrote to memory of 1236 2308 rundll32.exe 29 PID 2308 wrote to memory of 1236 2308 rundll32.exe 29 PID 2308 wrote to memory of 1236 2308 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b71681296871f06e38184d42f6138f33_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b71681296871f06e38184d42f6138f33_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 3003⤵
- Program crash
PID:1236
-
-