Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
db2d3634d80c2bb511544cec623a1eb8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2d3634d80c2bb511544cec623a1eb8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db2d3634d80c2bb511544cec623a1eb8_JaffaCakes118.dll
-
Size
211KB
-
MD5
db2d3634d80c2bb511544cec623a1eb8
-
SHA1
86604351580230a3d050deece33fd6be997c63f3
-
SHA256
c79736be1e8982a6533bfde9e622e356ccf74f1a5515f112b2a5ef05bb8adb4a
-
SHA512
3f44039c49f0c67502d2444b1733988fa4c764b3ff8caddd9f0d43042af5e599fce943a352ed58381ab4eb5c7bfd8874a2c1c492a488d9ef3f1a99651b5c2163
-
SSDEEP
192:YrFre1Zpl3Iejbi+Bphzjsz+UgE2z1X85g6GzwUu9jGmrTeH1VqVkgUw9O:Yrw1Tl33igccE2zFSnGzw7tc199
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2232 2012 rundll32.exe 83 PID 2012 wrote to memory of 2232 2012 rundll32.exe 83 PID 2012 wrote to memory of 2232 2012 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db2d3634d80c2bb511544cec623a1eb8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db2d3634d80c2bb511544cec623a1eb8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2232
-