Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SFhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SFhelper.dll
Resource
win10v2004-20240802-en
General
-
Target
SFhelper.dll
-
Size
90KB
-
MD5
05fc8bccccdabed0243488f3d7a30a75
-
SHA1
dfafc4da35a1182e7e1f5d4f32e6d600482b8a13
-
SHA256
ff553449b2d4b769a25b8b6c639d8b5d962ddce24b4601a1bff41b8fc7697376
-
SHA512
e326ef5f312c9a3c2ff7e09fc276e4b14aebfe17563ae44e47f7184b8c0dc9ac89f78d56e785b099e897945871a7dcd04747c0cd457128bca539baeca388f968
-
SSDEEP
1536:21Y63GYd+/TMY5IznqfilmW8otkKCt7Ab3VLXONAQ5M89CLqudzfiGkGmDkrwJVb:2t2Yd+/1ilH8ALlLX6AWDTudrXrUuWr
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 3068 3004 rundll32.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 468 wrote to memory of 3004 468 rundll32.exe 30 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31 PID 3004 wrote to memory of 3068 3004 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#13⤵PID:3068
-
-