Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
dfa885bda29c305d740b14280800038d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dfa885bda29c305d740b14280800038d_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
dfa885bda29c305d740b14280800038d_JaffaCakes118.dll
-
Size
833KB
-
MD5
dfa885bda29c305d740b14280800038d
-
SHA1
d141c82e5af3461de9579e82b4ca4b86c1eb08f7
-
SHA256
d4d57157c6616a031c3f69dd754768411594ad0927e9197b1420c8ff224225b5
-
SHA512
3ae9a20e63d91b285ec4d0eb8efdfc471c647f7556ea3f920dd17f09d001aa22c6fdd2a966096703d16e4e4309019476e5bde4821bbe25ca31ac7980b48dfa17
-
SSDEEP
12288:7I5VuzMSiaNF0SfVfZZl//DkfB1ukHsOaqVgQvzBA0CXoDOzW5Ph:cn4bN0S/3K1VaqVhzSZ4DOzq5
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 35 3240 rundll32.exe 37 3240 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\268ec8617a.dl rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3240 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3240 3736 rundll32.exe 85 PID 3736 wrote to memory of 3240 3736 rundll32.exe 85 PID 3736 wrote to memory of 3240 3736 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfa885bda29c305d740b14280800038d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfa885bda29c305d740b14280800038d_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3240
-