Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
53bbfa8c7c5ad2fa0e80dcebe4a1a640_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53bbfa8c7c5ad2fa0e80dcebe4a1a640_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
53bbfa8c7c5ad2fa0e80dcebe4a1a640_JaffaCakes118.dll
-
Size
51KB
-
MD5
53bbfa8c7c5ad2fa0e80dcebe4a1a640
-
SHA1
812061b327384ecc162f7c15945dca391476784b
-
SHA256
aa89658d03e44b0b900a2f29968d40a4a1afb443dbe799d687787ed0ddf1b4db
-
SHA512
782115be0162b0ea51996f5f3119bbdf2aa90eb2e0c7dd8cb3fa3b60bc87a8740cf7871004f98b8f848f086fa1c2edb2ecdae94db023549d553558650c0d9280
-
SSDEEP
1536:o6xFM7HeBXv7BjcyyjLC2ITNNqQ9FU5+Vh:o6x+7+dv5ALINqQS+Vh
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rafajigi.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\dujezibi rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4860 rundll32.exe 4860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4860 2848 rundll32.exe 84 PID 2848 wrote to memory of 4860 2848 rundll32.exe 84 PID 2848 wrote to memory of 4860 2848 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bbfa8c7c5ad2fa0e80dcebe4a1a640_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bbfa8c7c5ad2fa0e80dcebe4a1a640_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4860
-