Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
-
Size
7KB
-
MD5
f59e1979b673348cafd472b0470d595d
-
SHA1
a8c54ae7e32a06dd58ed8926d34a8a48ef03da11
-
SHA256
47a436ff52c0b1d37f951a7e5ca185d136bacf7043e5c581c9d2bd94ff843969
-
SHA512
1032b1844590b37e0015dccd067e95c7065923daf52e72c56c66bfd2e2c2ce81cd0cb0af8703ed679f2af5921df3f6c8a26be82f9df8e9aabe5164ed6176e868
-
SSDEEP
96:PHWaQTNCWRcX4r06S9IdHt5//FkUhP68J:PkCWK99IdHttOYS8J
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2520 set thread context of 2356 2520 rundll32.exe 32 PID 2520 set thread context of 2272 2520 rundll32.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2408 wrote to memory of 2520 2408 rundll32.exe 31 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2356 2520 rundll32.exe 32 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33 PID 2520 wrote to memory of 2272 2520 rundll32.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-