Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
-
Size
138KB
-
MD5
f55837c70c1d870facd7cf263c0c4258
-
SHA1
ea9ed68d74a344b2f5acb52bdb2a785ff13fbd2c
-
SHA256
a694c9081cf430f5902b818c0de821a3116cd315c0a5272bd8297655f6087f46
-
SHA512
789bc3347986d20ce3744706d40ac656304466b889c9564c25ef4fbdf67aaf80c743bdd2e7540f3b35f44ebe447995797bfa5603f4ebe768ac20084a69227222
-
SSDEEP
1536:Sd8MIMZT8M4FWSclUFRzFO9phaLRgOzl3OZdmzZZ/NFS46Glvs5W1swQ0:SybMF8h0qFbg8WOzZkqZZFFS4d31sR
Malware Config
Extracted
hancitor
1812_78213
http://unceliet.com/4/forum.php
http://fitiondice.ru/4/forum.php
http://wordlegromin.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2300 2672 rundll32.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2300 svchost.exe 2300 svchost.exe 2300 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2892 wrote to memory of 2672 2892 rundll32.exe 30 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31 PID 2672 wrote to memory of 2300 2672 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-