Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
-
Size
7KB
-
MD5
f59e1979b673348cafd472b0470d595d
-
SHA1
a8c54ae7e32a06dd58ed8926d34a8a48ef03da11
-
SHA256
47a436ff52c0b1d37f951a7e5ca185d136bacf7043e5c581c9d2bd94ff843969
-
SHA512
1032b1844590b37e0015dccd067e95c7065923daf52e72c56c66bfd2e2c2ce81cd0cb0af8703ed679f2af5921df3f6c8a26be82f9df8e9aabe5164ed6176e868
-
SSDEEP
96:PHWaQTNCWRcX4r06S9IdHt5//FkUhP68J:PkCWK99IdHttOYS8J
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5024 set thread context of 4720 5024 rundll32.exe 90 PID 5024 set thread context of 3676 5024 rundll32.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2696 wrote to memory of 5024 2696 rundll32.exe 82 PID 2696 wrote to memory of 5024 2696 rundll32.exe 82 PID 2696 wrote to memory of 5024 2696 rundll32.exe 82 PID 5024 wrote to memory of 4720 5024 rundll32.exe 90 PID 5024 wrote to memory of 4720 5024 rundll32.exe 90 PID 5024 wrote to memory of 4720 5024 rundll32.exe 90 PID 5024 wrote to memory of 4720 5024 rundll32.exe 90 PID 5024 wrote to memory of 3676 5024 rundll32.exe 91 PID 5024 wrote to memory of 3676 5024 rundll32.exe 91 PID 5024 wrote to memory of 3676 5024 rundll32.exe 91 PID 5024 wrote to memory of 3676 5024 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe3⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-