Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
56e31eed8bb950f4a7d3b7510feea597_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56e31eed8bb950f4a7d3b7510feea597_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
56e31eed8bb950f4a7d3b7510feea597_JaffaCakes118.dll
-
Size
78KB
-
MD5
56e31eed8bb950f4a7d3b7510feea597
-
SHA1
be40dff65908cf6b8500955053c48eceb9bda186
-
SHA256
e576411e26bc09f2b6a296855c8e68002b086c67fd70ac1716eeb648c346ba87
-
SHA512
b7b559ed9841f9900d95b7bce5a2c69a9a89c76caa984236dde6c0b71ed60c28c8c9b8abd83202c38faea4600e089093449e1501595ce5bdfa998da3abca1b5a
-
SSDEEP
1536:LaejhwzMyaS47KZNw0KHxRiP1zAxfc/3ieW9qW/8PRgHFBn/:t+BaS47KZtP1zAxixW+yn/
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 5 2264 rundll32.exe 6 2264 rundll32.exe 9 2264 rundll32.exe 10 2264 rundll32.exe 12 2264 rundll32.exe 14 2264 rundll32.exe 15 2264 rundll32.exe 16 2264 rundll32.exe 18 2264 rundll32.exe 19 2264 rundll32.exe 21 2264 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29 PID 2236 wrote to memory of 2264 2236 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e31eed8bb950f4a7d3b7510feea597_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56e31eed8bb950f4a7d3b7510feea597_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264
-