Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
f206abfc024129f1af253e5417f139d7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f206abfc024129f1af253e5417f139d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
5oqtt4jdequ.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
5oqtt4jdequ.dll
Resource
win10v2004-20240910-en
General
-
Target
5oqtt4jdequ.dll
-
Size
10KB
-
MD5
38c374a4ca22eb658fb1c4549c12108e
-
SHA1
c36a2dc7b48264b0bfcb256393770556dbece03d
-
SHA256
e1b2a995ff9d38bab0662cddf32e9160911f7a4a8b465f88ec62b8fd59bbce5d
-
SHA512
0f78f39c54b594c8f58fe47740a6d2bb83acb25b0678eb07060f30f18533d34d3dde9bdd8a65042b0b6a0eab6fa00e83216142033ca633a1d4642386488f5979
-
SSDEEP
192:WGgRL00vgnl38R7bG8Qq/nRtAvab8EM0Q+6oOfcFwRm2oSZ14:WrBy36HG8R+sQ+6tBaSZS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid Process 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe 2172 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30 PID 2056 wrote to memory of 2172 2056 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5oqtt4jdequ.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5oqtt4jdequ.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172
-