Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
-
Size
66KB
-
MD5
d7421ee9b0d288ea38f289032bb6c323
-
SHA1
1519b1f77e9156f7c61c948a7ba7768a26679f66
-
SHA256
546a405416a1e9385c981e70a7805e822b20b26c8bb5eb8344665700b777996a
-
SHA512
881ec6acd0c13f1c12a2c1e707b335df91f5ece5834aa92f7cdd110fdb20ba7875a605337917faf1d11d82ae62dd09bfc5cf0de771007cae3c7d555341157370
-
SSDEEP
1536:FdqwQtpmiYd8Wcg+Qo9DFxOj/djLonQ6M2L5WGOnkwLq3W1bXo:vApa8bgO9JxwdjLonQBY5JekwLqGi
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2420 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30 PID 1628 wrote to memory of 2420 1628 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2420
-