Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll
-
Size
66KB
-
MD5
d7421ee9b0d288ea38f289032bb6c323
-
SHA1
1519b1f77e9156f7c61c948a7ba7768a26679f66
-
SHA256
546a405416a1e9385c981e70a7805e822b20b26c8bb5eb8344665700b777996a
-
SHA512
881ec6acd0c13f1c12a2c1e707b335df91f5ece5834aa92f7cdd110fdb20ba7875a605337917faf1d11d82ae62dd09bfc5cf0de771007cae3c7d555341157370
-
SSDEEP
1536:FdqwQtpmiYd8Wcg+Qo9DFxOj/djLonQ6M2L5WGOnkwLq3W1bXo:vApa8bgO9JxwdjLonQBY5JekwLqGi
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1044 3344 rundll32.exe 82 PID 3344 wrote to memory of 1044 3344 rundll32.exe 82 PID 3344 wrote to memory of 1044 3344 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7421ee9b0d288ea38f289032bb6c323_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1044
-