Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 18:41
Behavioral task
behavioral1
Sample
bcbe0b033ad9f3a70ed8a416ab8918d8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcbe0b033ad9f3a70ed8a416ab8918d8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bcbe0b033ad9f3a70ed8a416ab8918d8_JaffaCakes118.dll
-
Size
204KB
-
MD5
bcbe0b033ad9f3a70ed8a416ab8918d8
-
SHA1
cba04e5be093f2a53ae250dcdf0be91f4798fc7b
-
SHA256
1d67f7020343c6fad03c0155bce1f8feec505ebde9f683d2bb9cb1ff60746673
-
SHA512
de552746b62d4938ba0733c9fcf9227b32a5741ccfd30407a180c31d76e29e5da54164c2fe6119e541f7f8f02996c9b975cfdd1f922e5297afe081c73e22a9af
-
SSDEEP
3072:vYZMLXgneRetpsBgYDe2LpTo6v6pCz5wycKDuve16NF73xj7i/:AOgnEv/lMgiCuOO73d7U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3088 rundll32.exe Token: SeSecurityPrivilege 3088 rundll32.exe Token: SeTakeOwnershipPrivilege 3088 rundll32.exe Token: SeLoadDriverPrivilege 3088 rundll32.exe Token: SeSystemProfilePrivilege 3088 rundll32.exe Token: SeSystemtimePrivilege 3088 rundll32.exe Token: SeProfSingleProcessPrivilege 3088 rundll32.exe Token: SeIncBasePriorityPrivilege 3088 rundll32.exe Token: SeCreatePagefilePrivilege 3088 rundll32.exe Token: SeBackupPrivilege 3088 rundll32.exe Token: SeRestorePrivilege 3088 rundll32.exe Token: SeShutdownPrivilege 3088 rundll32.exe Token: SeDebugPrivilege 3088 rundll32.exe Token: SeSystemEnvironmentPrivilege 3088 rundll32.exe Token: SeRemoteShutdownPrivilege 3088 rundll32.exe Token: SeUndockPrivilege 3088 rundll32.exe Token: SeManageVolumePrivilege 3088 rundll32.exe Token: 33 3088 rundll32.exe Token: 34 3088 rundll32.exe Token: 35 3088 rundll32.exe Token: 36 3088 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3088 1448 rundll32.exe 84 PID 1448 wrote to memory of 3088 1448 rundll32.exe 84 PID 1448 wrote to memory of 3088 1448 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcbe0b033ad9f3a70ed8a416ab8918d8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcbe0b033ad9f3a70ed8a416ab8918d8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3088
-