Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
dd32c235dc3fa4dff11d6aa679f74483_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd32c235dc3fa4dff11d6aa679f74483_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dd32c235dc3fa4dff11d6aa679f74483_JaffaCakes118.dll
-
Size
186KB
-
MD5
dd32c235dc3fa4dff11d6aa679f74483
-
SHA1
75067f84f325c33a98a74eedde4bf343eafa6573
-
SHA256
7da12f1779379387c088b7d0025e108df97499f651ff57dfd22535086ea17a5c
-
SHA512
53d1906a576e4af8669a457df60d7b0ba661e77a7d3c69f16feb73ea3e5a213234dbc3a830541d5f731cc146a4372709acfb30501d745a5f3a8a2bcb26bf2d96
-
SSDEEP
3072:VPmNaB8q1eMaf8UjEN1G7cpTXQr4NeAlIB8brdAgJKRVoxDcMExIC1:VPAAeHkvN9ArdAOcrWgJUs
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30 PID 2508 wrote to memory of 2364 2508 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd32c235dc3fa4dff11d6aa679f74483_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd32c235dc3fa4dff11d6aa679f74483_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2364
-