Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
ee86f43fd376d292f493c05faa300c70_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee86f43fd376d292f493c05faa300c70_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ee86f43fd376d292f493c05faa300c70_JaffaCakes118.dll
-
Size
6KB
-
MD5
ee86f43fd376d292f493c05faa300c70
-
SHA1
4e8cccd73f0cbd665dc45c08324d9e4ec691c850
-
SHA256
f94919c2f3e7135fe3cac7ecbd9e728aa4f63a7a8a51a1492b350796f31b60a1
-
SHA512
f6b991ca3e9876c6c4e5b9f48aeb8fb994ea4142b941c3407ec79e90a363920accc68d396071d69fc1432136700be0100814a04fba4f6da2a06172d8b4be722f
-
SSDEEP
192:kO/wGmtwHuPmWriu1zijBJ07LatFjlNkgUwu:kYfTJaLatBw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe 2920 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2920 rundll32.exe Token: SeSystemtimePrivilege 2920 rundll32.exe Token: SeSystemtimePrivilege 2920 rundll32.exe Token: SeSystemtimePrivilege 2920 rundll32.exe Token: SeSystemtimePrivilege 2920 rundll32.exe Token: SeSystemtimePrivilege 2920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2920 1180 rundll32.exe 82 PID 1180 wrote to memory of 2920 1180 rundll32.exe 82 PID 1180 wrote to memory of 2920 1180 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee86f43fd376d292f493c05faa300c70_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee86f43fd376d292f493c05faa300c70_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-