Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 19:48
Behavioral task
behavioral1
Sample
deca4fcd630c05bc38ffafd6db01c763_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deca4fcd630c05bc38ffafd6db01c763_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
deca4fcd630c05bc38ffafd6db01c763_JaffaCakes118.dll
-
Size
147KB
-
MD5
deca4fcd630c05bc38ffafd6db01c763
-
SHA1
8beee205091c6bf53154dbb065fda3e4be18cb14
-
SHA256
77d0a1fe879a8398006b83ad851e1a9afdf7bb5d0e7130426ac6767546d75951
-
SHA512
f40de4bb519a9057ab3add4577bf7990f4ac3bd554a7663f931dd57fff46b923f0af0fe34c183d5729dc4b12c44df663ff547c1e43a537867d9dd479d0b9e3fb
-
SSDEEP
3072:OMF/+pKv731j6km3ZwqKKfnjSngs0OWuB7cW+ydLbmtTzMSsz:DB1TFj6km3fSnKuBcWxoMd
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\5.dll rundll32.exe File created C:\Windows\0.idx rundll32.exe File opened for modification C:\Windows\1.dat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31 PID 2700 wrote to memory of 2788 2700 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deca4fcd630c05bc38ffafd6db01c763_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deca4fcd630c05bc38ffafd6db01c763_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2788
-