Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
d4e11c0c9b3263207042f9b604e5c186_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e11c0c9b3263207042f9b604e5c186_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4e11c0c9b3263207042f9b604e5c186_JaffaCakes118.dll
-
Size
872KB
-
MD5
d4e11c0c9b3263207042f9b604e5c186
-
SHA1
37a28fdfa44839d42d202a6655e9bedfbf21eefb
-
SHA256
00c1466d761f00e6ebb2e8a20663897b7ec9ea434a53b8f0eeb115fba7c2b10e
-
SHA512
78a288c48d66b98b479bcc89cbc719bda63de9f388d12333e4e3c1bc6486bfb063295824b0365536946a3046098cdd638ea3b1e70b6194d9f246c167293fbcf0
-
SSDEEP
12288:jPABIRZjSCMJiMcPfriBhGJIJ64DL9EG3zu3no:jTRZ+CMUMc3riBhZJ64DL9EG3uno
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2364 rundll32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30 PID 3064 wrote to memory of 2364 3064 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4e11c0c9b3263207042f9b604e5c186_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4e11c0c9b3263207042f9b604e5c186_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2364
-