Analysis
-
max time kernel
129s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll
-
Size
138KB
-
MD5
f55837c70c1d870facd7cf263c0c4258
-
SHA1
ea9ed68d74a344b2f5acb52bdb2a785ff13fbd2c
-
SHA256
a694c9081cf430f5902b818c0de821a3116cd315c0a5272bd8297655f6087f46
-
SHA512
789bc3347986d20ce3744706d40ac656304466b889c9564c25ef4fbdf67aaf80c743bdd2e7540f3b35f44ebe447995797bfa5603f4ebe768ac20084a69227222
-
SSDEEP
1536:Sd8MIMZT8M4FWSclUFRzFO9phaLRgOzl3OZdmzZZ/NFS46Glvs5W1swQ0:SybMF8h0qFbg8WOzZkqZZFFS4d31sR
Malware Config
Extracted
hancitor
1812_78213
http://unceliet.com/4/forum.php
http://fitiondice.ru/4/forum.php
http://wordlegromin.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 1528 3660 rundll32.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 svchost.exe 1528 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3660 3592 rundll32.exe 83 PID 3592 wrote to memory of 3660 3592 rundll32.exe 83 PID 3592 wrote to memory of 3660 3592 rundll32.exe 83 PID 3660 wrote to memory of 1528 3660 rundll32.exe 93 PID 3660 wrote to memory of 1528 3660 rundll32.exe 93 PID 3660 wrote to memory of 1528 3660 rundll32.exe 93 PID 3660 wrote to memory of 1528 3660 rundll32.exe 93 PID 3660 wrote to memory of 1528 3660 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f55837c70c1d870facd7cf263c0c4258_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-