Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:00
Behavioral task
behavioral1
Sample
ea8bdfbb95a10668626b7d64f9059a46_JaffaCakes118.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
ea8bdfbb95a10668626b7d64f9059a46_JaffaCakes118.dll
-
Size
864KB
-
MD5
ea8bdfbb95a10668626b7d64f9059a46
-
SHA1
113f1e1a153bf57c54a4f2a85ffec83452297e5d
-
SHA256
289dc4845b4e061f3853efb61d4e9645f46d4e64da1f65e14795dfc18873eb5e
-
SHA512
a172e9d24882cfbccb5eb13573c63c28fb1c7a6d180c8994d811a0b1f0b3794abe6aa9e7b14ef5d27823f3de12c2c4cbc1bb26202cb1bfd770475fddbadbc0a0
-
SSDEEP
12288:N8xqsDR1uMj0VLpa5cFieDY+fZs6TCl3xY4zgUF9nC/bfChYnhu:NRu0dpPFieDY+Pul3Tm/bfC6no
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2216-0-0x0000000010000000-0x0000000010100000-memory.dmp vmprotect behavioral1/memory/2216-2-0x0000000010000000-0x0000000010100000-memory.dmp vmprotect behavioral1/memory/2216-3-0x0000000010000000-0x0000000010100000-memory.dmp vmprotect behavioral1/memory/2216-4-0x0000000010000000-0x0000000010100000-memory.dmp vmprotect behavioral1/memory/2216-6-0x0000000010000000-0x0000000010100000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2216 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28 PID 800 wrote to memory of 2216 800 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8bdfbb95a10668626b7d64f9059a46_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8bdfbb95a10668626b7d64f9059a46_JaffaCakes118.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2216
-