Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 15:20
Behavioral task
behavioral1
Sample
f64b64519d9b8bdd4c264d167785a72b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f64b64519d9b8bdd4c264d167785a72b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f64b64519d9b8bdd4c264d167785a72b_JaffaCakes118.dll
-
Size
22KB
-
MD5
f64b64519d9b8bdd4c264d167785a72b
-
SHA1
5a429a901378d938ba1655bce096928e2f7160e7
-
SHA256
c8030651a3dbe48ba7068ebbb94a99211535c51b48855c6f76b62088119ba260
-
SHA512
0e577921e038be30782432f5a294f73657c8354b42a150302d1d96ff923b6039fc911dcb4a6c408dfd13140221574dc1e09d5344f3e7bed89e0899f73f5aeea4
-
SSDEEP
384:NeH+tWzlSDrb5+gIS3a2Oaa2pbNGJ38pPJv1TCAxAr6+S9Pfu7n5i:ntWurb6SOalwYxv1TlxndeVi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wscript.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2260 wrote to memory of 2664 2260 rundll32.exe 30 PID 2664 wrote to memory of 2160 2664 rundll32.exe 31 PID 2664 wrote to memory of 2160 2664 rundll32.exe 31 PID 2664 wrote to memory of 2160 2664 rundll32.exe 31 PID 2664 wrote to memory of 2160 2664 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f64b64519d9b8bdd4c264d167785a72b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f64b64519d9b8bdd4c264d167785a72b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Wscript.exeWscript.exe c:\windows\ime\vbs\pp.vbs3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-