Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
-
Size
47KB
-
MD5
fb9383a9dc4219bc03bb595eabc0879f
-
SHA1
38d23367974467928b23e1c5780bc47fea9f9532
-
SHA256
79866adb4a2253fa8f092d50cb93ee1bd0d1bd55649ae3b5f5ff24e3ed57119b
-
SHA512
43ae3d0fb117d7e79f4c534b744400db8946625cf577001e75b24609cff1263693ddb999cd49c3339b7ef30d2f67c6da90eecf27aa0957953852c903a41ba6e4
-
SSDEEP
768:UhidWKPv/JsdkkD+uN5/22ePrRpQaqjsr8SDUdPVz2L8JfL30F:UcdXv/JsXDf5OxRxqjsr8tdPVKLoDEF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2168 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 868 wrote to memory of 2168 868 rundll32.exe 31 PID 2168 wrote to memory of 1208 2168 rundll32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll,#13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168
-
-