Analysis
-
max time kernel
95s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 00:41
Behavioral task
behavioral1
Sample
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
-
Size
34KB
-
MD5
d329f6855eee22d331187c119918ab2d
-
SHA1
bb8a4df212d3d471670ac1a5b0c48de7630c7197
-
SHA256
d10842d8c3ce0b16566bfc7ed6b7db3924b735c8e90faac55650705134c27e2b
-
SHA512
31d9bf3f390cbf3aef85441f1da53703c240da044e2ca378cf2c356757329c62cdeebf205b562df6044dfcdad2fc2b997dc5c16a2488c9b9a3c44a57b34f7946
-
SSDEEP
768:Yoi4qZOLQNwdXcBq5OpBlaKr91EPFME3ryYdR4ftI9QuV:Yv4qZyQNwdcUOpBlaO1oMsrNUuV
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 8 5104 rundll32.exe 9 5104 rundll32.exe 10 5104 rundll32.exe 11 5104 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\instalflash.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\instalflash.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4620 wrote to memory of 5104 4620 rundll32.exe 83 PID 4620 wrote to memory of 5104 4620 rundll32.exe 83 PID 4620 wrote to memory of 5104 4620 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5104
-