Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll
-
Size
169KB
-
MD5
d2ce12a0f82ec4a86fdd11bf57858ae6
-
SHA1
d48f37cfd5124518e74ca723d7aabeea23f4011d
-
SHA256
0ad0c664db75bcb489c4c2e49e05486e11b758299252870c6a42b3d35bff7a2c
-
SHA512
a591029d7243e34f46d1cff3730705d63b548fea20c472f69ba09aa78f59219ebf2597c80d95aa4306dc7389736c0b28bdd85cc8608e951b0e88d9edf4566947
-
SSDEEP
3072:Q8pLwr/4c4I/vLWhX6BUgvXai8vXvoEhLryou:O4cL/jWhoUWujL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Okopulukeliku = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2908 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2428 wrote to memory of 2908 2428 rundll32.exe 30 PID 2908 wrote to memory of 2320 2908 rundll32.exe 31 PID 2908 wrote to memory of 2320 2908 rundll32.exe 31 PID 2908 wrote to memory of 2320 2908 rundll32.exe 31 PID 2908 wrote to memory of 2320 2908 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2ce12a0f82ec4a86fdd11bf57858ae6_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-