Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ed9049dda2e3afb6a80112153c330060_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed9049dda2e3afb6a80112153c330060_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ed9049dda2e3afb6a80112153c330060_JaffaCakes118.dll
-
Size
268KB
-
MD5
ed9049dda2e3afb6a80112153c330060
-
SHA1
492d457e8011707d214042855dc6b30c987eff18
-
SHA256
5fd72bf3f00aded754c80b98c696857de6e49254ef35e842aee614d49074f746
-
SHA512
23982bf8274e2be99f068046f74bb1300c8087ce47f66adaad0d16e2d68a11ab3f925ae11de923871e5563c203a19956793af717a47cd5477ca687f59558f61c
-
SSDEEP
6144:pVoh5Mv42+T1g60hhQlR8LDyBpk7JY5D5K:BqluSc7JY5
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\wdpoefan = "{047098F5-40ED-405D-BFD4-28FD82511C79}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{047098F5-40ED-405D-BFD4-28FD82511C79} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{047098F5-40ED-405D-BFD4-28FD82511C79}\InProcServer32\ = "C:\\Windows\\wdpoefan.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{047098F5-40ED-405D-BFD4-28FD82511C79}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4388 4704 rundll32.exe 82 PID 4704 wrote to memory of 4388 4704 rundll32.exe 82 PID 4704 wrote to memory of 4388 4704 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed9049dda2e3afb6a80112153c330060_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed9049dda2e3afb6a80112153c330060_JaffaCakes118.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4388
-