Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
122f82aff2c5176f56e2351129f150c1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
122f82aff2c5176f56e2351129f150c1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
122f82aff2c5176f56e2351129f150c1_JaffaCakes118.dll
-
Size
41KB
-
MD5
122f82aff2c5176f56e2351129f150c1
-
SHA1
24aec7c0b059d2e5b5158e169a7f68913df42790
-
SHA256
96559a8b3686ec7a8f8b89e81958e42965c238f0c65ddfd9920622f80afcb95f
-
SHA512
b2b39c2e3fd8a387015e53a403ab234fb59a502ccf36396a4c2f56ecd74b161d4dfed8cb7f0ad60592eb4e9a0705e8b4b79e4930e1b3827f535b36cedb528e93
-
SSDEEP
768:d8ESlwLewrjq+wtS511BBdD3jY+VgLk4kQvx14lV6xY4htfnGw4pAKqatW:dHA2vjqjS51TL7jY+yAjK+MfnGh5qaU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 5116 rundll32.exe Token: SeIncBasePriorityPrivilege 5116 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5060 wrote to memory of 5116 5060 rundll32.exe 82 PID 5060 wrote to memory of 5116 5060 rundll32.exe 82 PID 5060 wrote to memory of 5116 5060 rundll32.exe 82 PID 5116 wrote to memory of 1800 5116 rundll32.exe 83 PID 5116 wrote to memory of 1800 5116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\122f82aff2c5176f56e2351129f150c1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\122f82aff2c5176f56e2351129f150c1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1800
-
-