Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll
-
Size
493KB
-
MD5
efddc2807ecbdffd694cd97936404053
-
SHA1
c68b7b94e591fbc4cda9bdb8c2caaa33880464c7
-
SHA256
830700df4fc2b75b067479d6f2f67d51dff7e883d2a33793c905380a9351cb46
-
SHA512
e6b0fd0f52c5b7e82bb66d08c4a3f8a4bddf1ce75c140e73afb4c1f57131df81e5d39f7833de15b40e980f0605bfd1840f81b610134634db000f6e18388bf09a
-
SSDEEP
12288:WsCr6MfAEtHaqxnXmtkl0CMh+1wY7JuegO4I9y:Wsi6MBtHBzlRMg1wY34I9y
Malware Config
Extracted
zloader
nut
18/02
https://ramkanshop.ir/post.php
https://lph786.com/post.php
https://efaschoolfarooka.com/post.php
https://forexstick.com/post.php
https://firteccom.com/post.php
https://www.psychologynewmind.com/post.php
https://dirashightapbide.tk/post.php
-
build_id
358
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 41 3872 msiexec.exe 42 3872 msiexec.exe 46 3872 msiexec.exe 47 3872 msiexec.exe 50 3872 msiexec.exe 51 3872 msiexec.exe 64 3872 msiexec.exe 65 3872 msiexec.exe 67 3872 msiexec.exe 71 3872 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1000 set thread context of 3872 1000 rundll32.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3872 msiexec.exe Token: SeSecurityPrivilege 3872 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1000 1944 rundll32.exe 89 PID 1944 wrote to memory of 1000 1944 rundll32.exe 89 PID 1944 wrote to memory of 1000 1944 rundll32.exe 89 PID 1000 wrote to memory of 3872 1000 rundll32.exe 98 PID 1000 wrote to memory of 3872 1000 rundll32.exe 98 PID 1000 wrote to memory of 3872 1000 rundll32.exe 98 PID 1000 wrote to memory of 3872 1000 rundll32.exe 98 PID 1000 wrote to memory of 3872 1000 rundll32.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efddc2807ecbdffd694cd97936404053_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=1440 /prefetch:81⤵PID:884