Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
fa68bb4d0e467a2adbee0f0ff2138659_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa68bb4d0e467a2adbee0f0ff2138659_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fa68bb4d0e467a2adbee0f0ff2138659_JaffaCakes118.dll
-
Size
3KB
-
MD5
fa68bb4d0e467a2adbee0f0ff2138659
-
SHA1
375751c14dbcc1ff60c6a914c9d87ede4ea5043e
-
SHA256
3e020b32c1a16c3e51c4503e30e74b1194ad548ec33e45c8929d1c2e0986a28f
-
SHA512
dddc468d131540c9213518b601ed101eb249de4e7d797fdc8e7fbf4ccc9cc0b7c64c333f26869c869775eb69547189d0891e2667084c8231c8066900ce030a91
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\del.bat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2936 wrote to memory of 2112 2936 rundll32.exe 30 PID 2112 wrote to memory of 1072 2112 rundll32.exe 31 PID 2112 wrote to memory of 1072 2112 rundll32.exe 31 PID 2112 wrote to memory of 1072 2112 rundll32.exe 31 PID 2112 wrote to memory of 1072 2112 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa68bb4d0e467a2adbee0f0ff2138659_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa68bb4d0e467a2adbee0f0ff2138659_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5848bafd428812e4b9eb64f008d3b5099
SHA10a6812607d5e52d90342ebed9a473df407538802
SHA25633fc12026a2520e880cfd50e8ea3eeebb46fc941ecd53a95bb31bd10ba3391a8
SHA5122a70c079780f9912c8ef59db7aca453439a64e206dda132ed343dcd107f0504333ba071c5590749399df12ff4974cc275bb261783faecd184d7fd5d7c5d22aac