Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
d666123e156a281ceaf3e517a5037768_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d666123e156a281ceaf3e517a5037768_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d666123e156a281ceaf3e517a5037768_JaffaCakes118.dll
-
Size
777KB
-
MD5
d666123e156a281ceaf3e517a5037768
-
SHA1
2f86bcaf6877d1b23cb79a75fab2690408f40644
-
SHA256
f592815aef3220fa8d0fba81ba402f901481ad987e474f643d584444b4974ce0
-
SHA512
2fbe261624722832912f59d6e3770ab1a038a48efd724a64fd4e96f4f226fb9b5ac7aa5f6973b834805b7ee1df62a8ceaf57a5976df246b09541cbdf27b4fbf9
-
SSDEEP
12288:nFv7xuWq5+8oXCa6vAm6AzPF3W8as5smuPwE8/ubnpNDdIhODYcUkX+y4l:FzvYoXgnzp3W8as5FzErpNDdqcX1O
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2308 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\da76539a8c.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\da76539a8c.dl rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2308 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30 PID 2276 wrote to memory of 2308 2276 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d666123e156a281ceaf3e517a5037768_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d666123e156a281ceaf3e517a5037768_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5ee04034fb329cb5a3a8d442b90ab50fd
SHA177cfde1f1a2ec9113eacc329d49a094cd0dc9199
SHA256547319c0583d5dc137a78926d46770f81a2f1d9c0b9e1089417df2e5774506d7
SHA5128d47c00b4be2e4163d944d4c0704250ba1e87954762dbe1703cdd79efdde1826ff6103c805e0bd90a57234f85e7f9ef1937d34cbc4e225fd73faa6fdad6b2d4d