Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
fed24ee381becc64c9d0e62a34e912a5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fed24ee381becc64c9d0e62a34e912a5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fed24ee381becc64c9d0e62a34e912a5_JaffaCakes118.dll
-
Size
1.5MB
-
MD5
fed24ee381becc64c9d0e62a34e912a5
-
SHA1
2bc71f67693726468edb62d29d1da79a602ed109
-
SHA256
8c30848bd6392a02a1602adc087a90e0b113e984e074479ae37b78122b9401c1
-
SHA512
95b282e9bd5881abee9fe91e42bad430322af626c8f65b2aff239f963a3d6acd11f3b205c489a368e23a664a2e212db26b6daf4f8a91f5c1159dff93a07a4a81
-
SSDEEP
24576:PjKiDcgk6PUdN9Iuj6TZaqdiXSp0c02uFG6dAk3CM4Ii:Pdk7MTZaqdwk0c05HGiBi
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2288 4892 rundll32.exe 82 PID 4892 wrote to memory of 2288 4892 rundll32.exe 82 PID 4892 wrote to memory of 2288 4892 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed24ee381becc64c9d0e62a34e912a5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fed24ee381becc64c9d0e62a34e912a5_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2288
-