Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
-
Size
856KB
-
MD5
cea5c9d30f6bef64f0dcdee22e247ab3
-
SHA1
c753357137e38d1aa3ae757aae91a2f05268d2b5
-
SHA256
6163c4645c2538016949abe30f88fa0e979db806082c26e522c0e4824ba7fabc
-
SHA512
7784c2294f57d4c3e12e3a90dd8a05e9f29fb15512f2f3baeaf5549ef69acb0f8f3a75265d15d6857c4b78107adbe793e2f8ab97d0f30b24a75d963ba82237ee
-
SSDEEP
12288:s6InS9gcmnwH9Po/dl04E+yUu3QbStjM051pcO:sTnS9gcudQxUuAbStjd5EO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1792 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30 PID 2292 wrote to memory of 1792 2292 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792
-