Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
0eccf09e6e0a75fcfb2cefdcab75cc36_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0eccf09e6e0a75fcfb2cefdcab75cc36_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0eccf09e6e0a75fcfb2cefdcab75cc36_JaffaCakes118.dll
-
Size
20KB
-
MD5
0eccf09e6e0a75fcfb2cefdcab75cc36
-
SHA1
804d7956f591ab44decda5fdcdb64ada4c717ead
-
SHA256
ecdb4e016d6c1514dc16b511284e76c7214c085c5bbe106732ca731c63faf89a
-
SHA512
ba1029466db1f5c07ae000f75e24445efe2d3ba751b320315bf4e6b3600da9204ebe1a04acb953f8b6662a242e015b3125b08704dbc0650bba9cfd0be4f0311b
-
SSDEEP
384:zSG/2Jp+C6QhtmruxCcdIL+0XplLCAu8UaWHuqaTlX0wG:zfYh2oCtpXPLx2OqaewG
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2232 rundll32.exe 2232 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2232 rundll32.exe 2232 rundll32.exe 2232 rundll32.exe 2232 rundll32.exe 2232 rundll32.exe 2232 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2232 4612 rundll32.exe 82 PID 4612 wrote to memory of 2232 4612 rundll32.exe 82 PID 4612 wrote to memory of 2232 4612 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eccf09e6e0a75fcfb2cefdcab75cc36_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eccf09e6e0a75fcfb2cefdcab75cc36_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5fda0880126712920e9daa7a54ba89bd8
SHA119a0d89fadc2f0ba705ee4b3edd7caa7d9a64ecb
SHA256c59c4e53fe8a1e9f71af52b17ce99d54ac0d9a7ec35915f24a8318d1287e70c6
SHA512307bda5872496f5f7f885facc3283b0f0424fe64c90a216e47b679ea91804ddc48cad2c701c81f7a5c5a00240fabff910bf2928e6d616c882b43a788a3a14a3c