Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
e5cc38e0d031583b0cbca3b9132f3f5c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5cc38e0d031583b0cbca3b9132f3f5c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e5cc38e0d031583b0cbca3b9132f3f5c_JaffaCakes118.dll
-
Size
48KB
-
MD5
e5cc38e0d031583b0cbca3b9132f3f5c
-
SHA1
1441d47c616750d4d74446d9e7e3ff7b3bdb4ec2
-
SHA256
3c599fc3da99a5cb283c09f5d2aeed8f9c9a39ee5301131867a337595cb5b031
-
SHA512
546e99385166749e821d4fc4647940e3703f3fafcce77fc246c21e21ee8842b1378bb5316b77f4522334965943f543f75ba4789769c9352f158a3ed9648c188c
-
SSDEEP
768:vMBFY7fZTy2jEOdI6FBBBpH4RwHRiKvZpypFu0vu8IqLZcHyyUM:UBOdToi5B3H4RkiEQFuC1iHW
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3456 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3456 3972 rundll32.exe 82 PID 3972 wrote to memory of 3456 3972 rundll32.exe 82 PID 3972 wrote to memory of 3456 3972 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5cc38e0d031583b0cbca3b9132f3f5c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5cc38e0d031583b0cbca3b9132f3f5c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3456
-