Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
db2e020e7be39600281ec8334c8fb415_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db2e020e7be39600281ec8334c8fb415_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db2e020e7be39600281ec8334c8fb415_JaffaCakes118.dll
-
Size
228KB
-
MD5
db2e020e7be39600281ec8334c8fb415
-
SHA1
83a396cf461a3645e735b0515ee3e10ef65fec0b
-
SHA256
703d2f7409923b5f94eb57ea3441eac42ee64721e125aae4799290e1a35ffe8e
-
SHA512
28344f61e755da6b38291c9886fff273033e47bf9653bb89ce030e40184958ebb6e466bb99eee855dec738a8cdef53b5f6e76b0555c5b0087d66130919d394f4
-
SSDEEP
3072:Fn3+4RNtpB/MgcUNnfw0bjcZcR+5VsxvC6tvMF5yNdFPt0kLCPLm3sIr6G01:FnxNvB/t/t5g6SKnV0kLCPLm3sIrz
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\tawisys.ini rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db2e020e7be39600281ec8334c8fb415_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db2e020e7be39600281ec8334c8fb415_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15B
MD5f76b79ad78d2c7c08e33c53798efd7ab
SHA140e3ed279bb7e37b7e37c62ad9b7183f81234ca2
SHA2563c9fee212611cf3dde2fcc18e09e3811a37c6bc2eb4b542d1006f96601dfa04c
SHA5127aebfa69e2b70d647f64ed912ca6d5ae881d4df6679cac303c67a69abce98f4ef5d185b0c07efbe5fb67ee9453311f58a3ac50272889f59ba73e3c45ba667647