Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll
-
Size
116KB
-
MD5
c1e888c39c78930f204fbe36ac6ecab2
-
SHA1
9ea4f3b59beae791ea67114d65c639c2eda817fe
-
SHA256
7655bc015be7c53884d0a63a822917a3d7885279dfd446ec17ad7ac3023f5f2a
-
SHA512
27e2bc09bf92510ffd80a9ef1c7f36eb63157f8ee06d66683cd2131c29fdfaa8ef196c54eac23bd3d1751fe2d1e89733a235861373d9b9900413588a58bad257
-
SSDEEP
3072:ZPFrKYJiIG1S/WgUNuNf1SU3UzeGkA83+LW:rrZJPMYKUEze3AxL
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2208-6-0x00000000001D0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2208-4-0x00000000001D0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2208-3-0x00000000001D0000-0x00000000001DD000-memory.dmp upx behavioral1/memory/2208-0-0x00000000001D0000-0x00000000001DD000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\_next subdisk addressor: %f iterDataPump rundll32.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Setra-loup configles no pumps = %d by 2 U Timeout receieversion: Disk ,(lash = %d rundll32.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\m_DCRejective: NOT_GRANT_RSP_EVENTROL_V92 rundll32.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Chiled: %s rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30 PID 3000 wrote to memory of 2208 3000 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1e888c39c78930f204fbe36ac6ecab2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2208
-