Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:22
Behavioral task
behavioral1
Sample
e077b6fcf46a073883b032fee99d0cff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e077b6fcf46a073883b032fee99d0cff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e077b6fcf46a073883b032fee99d0cff_JaffaCakes118.dll
-
Size
911KB
-
MD5
e077b6fcf46a073883b032fee99d0cff
-
SHA1
e7654bc5fb9ec551d0173df647efc743e92d4fb7
-
SHA256
7027b2239ae146053f6eb0f31a4c3f0f6dc84af804ad44381705b9a041d086bb
-
SHA512
491b8f35b42dcaabb973159e1cf8f1e17410747d57e96900e511f71948495dd081861b78e5dbbd1406b35e3b63a8bdf4058ec879b844f6cb950bc149986ad86d
-
SSDEEP
12288:DauW0INNuTj3kvBGePiI/mKItFWexfY/64prc0jpedqd4hpFzfTOXtHmGGz:jW0INwv3kvB1iCe03vprleAd4PKmGGz
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\4a296d388e.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\4a296d388e.dl rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2684 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2684 4660 rundll32.exe 83 PID 4660 wrote to memory of 2684 4660 rundll32.exe 83 PID 4660 wrote to memory of 2684 4660 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e077b6fcf46a073883b032fee99d0cff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e077b6fcf46a073883b032fee99d0cff_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD52c51889a028022e4709e6d62cb9042f6
SHA1250d699c1d44184c6ae51dc3de76a7ef05054aef
SHA256b3d4956e8d0ba6cf2cf096970c130cdb9fe5b528848dc21c0e10be83bc1f0cc9
SHA512686d67f44ee9350d33e569e781ee8e19c80d0f50fc1597c1792ef8d0e3cb12e7d12895b4316d48363b25984cb75d7bf21765a4afb122cd9017165c02fcb96da6