Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
bb75737080958a3a13a2f63c900cec18_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb75737080958a3a13a2f63c900cec18_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bb75737080958a3a13a2f63c900cec18_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
bb75737080958a3a13a2f63c900cec18
-
SHA1
117f5e0be92d9a6e3f86980427f1eea0cce76503
-
SHA256
16cd383d75a3d2300846f2b2a563babc5bc3fccec6106f05b9d425aa541d77fd
-
SHA512
6dcb4a05b4cf125f927f9f06525aac2f2b446469013ec9ab1cc7c47ba0dd7b75ec3dbd067a3066a48e10a66d51e53d959b5e3335469a93c5e65d9bd7a2cc92ad
-
SSDEEP
49152:zVj9OoZI01+t/NJQ+sG/1pQLYhCP64DJivd:zVkeFSQG/880CGJMd
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2368 2284 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2284 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2284 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2336 wrote to memory of 2284 2336 rundll32.exe 30 PID 2284 wrote to memory of 2368 2284 rundll32.exe 31 PID 2284 wrote to memory of 2368 2284 rundll32.exe 31 PID 2284 wrote to memory of 2368 2284 rundll32.exe 31 PID 2284 wrote to memory of 2368 2284 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb75737080958a3a13a2f63c900cec18_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb75737080958a3a13a2f63c900cec18_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 2883⤵
- Program crash
PID:2368
-
-