Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
ea90a1686bc0cd8d47c923beb2c6c316_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea90a1686bc0cd8d47c923beb2c6c316_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea90a1686bc0cd8d47c923beb2c6c316_JaffaCakes118.dll
-
Size
708KB
-
MD5
ea90a1686bc0cd8d47c923beb2c6c316
-
SHA1
598ba6c3701bba33d0016a30e2989fb9e8f72f56
-
SHA256
95c39f8920ccfad121684f23805660fcbfaa56f8be451995b3c431752415a85c
-
SHA512
b81ec696b5e1ae96ea9935ce45304c779ee3cd174b1b53f248949da04591393aeedbfe35802cbf2f289cadca371eb3eeaa57aea4c8976224aeedb0ac77708dee
-
SSDEEP
6144:w0e7Ex0WWCtmOldukg6voA8iHomtJzYUhEwrLUYa6cgvF3klHV2cgm5VeOEriYJ9:w0e7ESWykg4RlHomtVZ4xlHjZgi
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2124 2896 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2896 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 rundll32.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe 2896 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 1656 wrote to memory of 2896 1656 rundll32.exe 30 PID 2896 wrote to memory of 2124 2896 rundll32.exe 31 PID 2896 wrote to memory of 2124 2896 rundll32.exe 31 PID 2896 wrote to memory of 2124 2896 rundll32.exe 31 PID 2896 wrote to memory of 2124 2896 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea90a1686bc0cd8d47c923beb2c6c316_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea90a1686bc0cd8d47c923beb2c6c316_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 3683⤵
- Program crash
PID:2124
-
-