Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
-
Size
28KB
-
MD5
0979780ca4a3647cba204a78e8d051c4
-
SHA1
a87afa981e61976752f24c4d1237ac92fdbb7a08
-
SHA256
de60f79553ef9106bc50a48ebcc1e618e01b370bc8e1632350b4b574faba9376
-
SHA512
afbfebb5c997f10d500c451e7b91b3210889ba5a9c282fc029888dfff6935e43d399e287bfd1197c07494ecbb19afbaa7af4f2b9311ef129ae65de7224e7bb16
-
SSDEEP
768:jV0K7BFkJbham+qg+wJHTxuWqCs2+JylIdTpb:pHiFbIJAB9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2896 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2896 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28 PID 1700 wrote to memory of 2896 1700 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896
-