Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 17:12
Behavioral task
behavioral1
Sample
06ad83fc7d3265a37b6aa64314930e20_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
06ad83fc7d3265a37b6aa64314930e20_JaffaCakes118.dll
-
Size
701KB
-
MD5
06ad83fc7d3265a37b6aa64314930e20
-
SHA1
0327027fe2223e95c9f7728d4d3e049b6566477a
-
SHA256
a1911859f546fdbcb36457c30199f4ca3ed2aa161654e2ff2db0893e0b064c45
-
SHA512
377c2d0bf544437167710ff2b73ef92de33fdb7f5d30dd937526c73a89a13c4ac29f4bce403d0e89942f65030c9b9973051b7896a80827956767fcf4e0dddbb8
-
SSDEEP
12288:SSYJvY39MklV1xSuZ31Wd1ZSvux1LUENTxBwFIKBqMPl4K5kZ8G66qK+bb9:SGM2TSulgd1ZCurdYbBa0kZ8wtop
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine rundll32.exe -
resource yara_rule behavioral2/memory/3728-0-0x0000000075050000-0x00000000751F2000-memory.dmp themida behavioral2/memory/3728-3-0x0000000075050000-0x00000000751F2000-memory.dmp themida -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3728 1460 rundll32.exe 83 PID 1460 wrote to memory of 3728 1460 rundll32.exe 83 PID 1460 wrote to memory of 3728 1460 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06ad83fc7d3265a37b6aa64314930e20_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06ad83fc7d3265a37b6aa64314930e20_JaffaCakes118.dll,#12⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:3728
-