Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll
-
Size
493KB
-
MD5
efddc2807ecbdffd694cd97936404053
-
SHA1
c68b7b94e591fbc4cda9bdb8c2caaa33880464c7
-
SHA256
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46
-
SHA512
e6b0fd0f52c5b7e82bb66d08c4a3f8a4bddf1ce75c140e73afb4c1f57131df81e5d39f7833de15b40e980f0605bfd1840f81b610134634db000f6e18388bf09a
-
SSDEEP
12288:WsCr6MfAEtHaqxnXmtkl0CMh+1wY7JuegO4I9y:Wsi6MBtHBzlRMg1wY34I9y
Malware Config
Extracted
zloader
nut
18/02
https://ramkanshop.ir/post.php
https://lph786.com/post.php
https://efaschoolfarooka.com/post.php
https://forexstick.com/post.php
https://firteccom.com/post.php
https://www.psychologynewmind.com/post.php
https://dirashightapbide.tk/post.php
-
build_id
358
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 14 1436 msiexec.exe 15 1436 msiexec.exe 16 1436 msiexec.exe 17 1436 msiexec.exe 18 1436 msiexec.exe 19 1436 msiexec.exe 20 1436 msiexec.exe 21 1436 msiexec.exe 22 1436 msiexec.exe 23 1436 msiexec.exe 24 1436 msiexec.exe 25 1436 msiexec.exe 26 1436 msiexec.exe 27 1436 msiexec.exe 28 1436 msiexec.exe 29 1436 msiexec.exe 30 1436 msiexec.exe 31 1436 msiexec.exe 32 1436 msiexec.exe 33 1436 msiexec.exe 34 1436 msiexec.exe 36 1436 msiexec.exe 37 1436 msiexec.exe 38 1436 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 1436 1088 rundll32.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1436 msiexec.exe Token: SeSecurityPrivilege 1436 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 2108 wrote to memory of 1088 2108 rundll32.exe 30 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32 PID 1088 wrote to memory of 1436 1088 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-