Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
2b2369fa87c3701c91eb21a3a244959d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b2369fa87c3701c91eb21a3a244959d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Install.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Install.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/Install.dll
-
Size
118KB
-
MD5
e81edaa559e98ed9a84c5175db1e40ec
-
SHA1
75052ce30697e432168e4bf99d72e58897a49db2
-
SHA256
82d993d06080cd61e1d8b92be092e25873dcc3dd26a452f4f15eea8e1f353337
-
SHA512
fc1e47084bdb4f0e1620da08d0311a3a5e9bbe9b1541ca8ff42591284825f0f4cc74dc2129d4448406e09b074483f5ccfa88382598131a4ab435afdfc275f995
-
SSDEEP
3072:ZcWIJLiGzH0SnFU6zhJ7U2GjUmIIO/zFceG4pN1:AiGzHlW2mnO/pa4l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30 PID 2728 wrote to memory of 2792 2728 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Install.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Install.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2792
-