Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
ff0d87dea93179cdb5d90f7a4f5f84f1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff0d87dea93179cdb5d90f7a4f5f84f1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff0d87dea93179cdb5d90f7a4f5f84f1_JaffaCakes118.dll
-
Size
4KB
-
MD5
ff0d87dea93179cdb5d90f7a4f5f84f1
-
SHA1
7e2f1c44c024f670f3d825ba0982a6fd55615335
-
SHA256
606d9d8b7dbb04a090a5981b8d6a280c371836498882a7e72dcd90f7db660d87
-
SHA512
02b2295b8fa30aa23dd9cd7100bc1df3a917614ea541e1882f76859f02bed2819deed8ea425662067d8f5e389eb5f076c0f61c0a9febd2b0b513bb9c3a393010
-
SSDEEP
48:SNTrgBuGBBdFgTgt0fVa2Mkb+XAIP8R/:D/BdBMVaG6wIP85
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "C:\\Windows\\system32\\IEsp.mht" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28 PID 1056 wrote to memory of 1040 1056 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff0d87dea93179cdb5d90f7a4f5f84f1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff0d87dea93179cdb5d90f7a4f5f84f1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
PID:1040
-